JP2007272364A - Off-line user authentication system, method and program - Google Patents

Off-line user authentication system, method and program Download PDF

Info

Publication number
JP2007272364A
JP2007272364A JP2006094782A JP2006094782A JP2007272364A JP 2007272364 A JP2007272364 A JP 2007272364A JP 2006094782 A JP2006094782 A JP 2006094782A JP 2006094782 A JP2006094782 A JP 2006094782A JP 2007272364 A JP2007272364 A JP 2007272364A
Authority
JP
Japan
Prior art keywords
pattern
user
offline
authentication
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2006094782A
Other languages
Japanese (ja)
Other versions
JP3996939B2 (en
Inventor
Tsugune Saito
Narutomo Tamai
Yukiya Ueda
幸哉 上田
成知 玉井
亜音 齋藤
Original Assignee
Cse:Kk
株式会社シー・エス・イー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cse:Kk, 株式会社シー・エス・イー filed Critical Cse:Kk
Priority to JP2006094782A priority Critical patent/JP3996939B2/en
Publication of JP2007272364A publication Critical patent/JP2007272364A/en
Application granted granted Critical
Publication of JP3996939B2 publication Critical patent/JP3996939B2/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • G11C7/24Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

To realize off-line matrix authentication with security ensured.
A user authentication system using a derivation rule for generating a one-time password by presenting a presentation pattern to a user to be authenticated and applying it to an element at a specific position included in the pattern, which is offline In the authentication client, a plurality of pattern element sequences constituting a presentation pattern, and a plurality of verification codes obtained by performing a one-way function operation on the result of applying a derivation rule to each of the presentation patterns are stored in the client. A presentation pattern is generated by selecting one from the stored pattern element strings, and authentication is performed by verifying the input one-time password based on a corresponding verification code.
[Selection] Figure 3

Description

  The present invention relates to a user authentication system, and more specifically, presents a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated, and applies the pattern element at a specific position included in the presentation pattern. The present invention relates to a user authentication system in which a one-time password derivation rule for generating a one-time password is used as the password of the user.

  In a user authentication system, as a system having higher security than a fixed password, a system using a one-time password which is a disposable password that can be used only once for user authentication has been used. For the one-time password, a value that uses a token that generates a one-time password based on a one-time password generation rule synchronized with the authentication server and a challenge value that changes from the authentication server to the client each time are sent to the client. There is a challenge response method that returns a response in which a password is applied according to a predetermined rule. The token can surely identify the user who has the token, but it is necessary to carry the token, and there is a problem in the cost of the token and the safety when the token is lost. On the other hand, in the challenge-response method, although there is the convenience that it is not necessary to use a token, a one-time password is generated using a fixed password that is easy to guess, so it is vulnerable to stealing when entering a password In addition, there is a problem that it is necessary to introduce dedicated software for generating a response to the client.

  In recent years, a so-called matrix authentication method user authentication system has been developed as a method for improving the problems of the conventional challenge / response method (see, for example, Patent Document 1 and Non-Patent Document 1). In matrix authentication, a matrix-like presentation pattern in which random numbers are arranged in a predetermined pattern is presented to a user who is going to be authenticated, and is applied to pattern elements (numbers of random numbers) included in the presentation pattern. The one-time password derivation rule for generating the one-time password is set as the password of the user. The server and the client share the same presentation pattern, and the one-time password that is the result of applying the one-time password derivation rule that is the password at the client to the presentation pattern and the one-time password derivation rule that is the password at the server By comparing with the verification code that is the result of applying to the above, user authentication is performed without directly comparing the passwords. In matrix authentication, the one-time password derivation rule, which is a password, is the position and order of the elements selected on the matrix, and is easy to memorize as an image. It cannot be specified.

  FIG. 15 is a block diagram of an on-line user authentication system 100 using conventional typical matrix authentication. In the conventional matrix authentication system, information for generating the presentation pattern 191 is transmitted from the authentication server 101 to the authentication request client 151 as the pattern element string 190 (see, for example, Patent Document 1). In the conventional matrix authentication system, the online authentication server 101 receives an authentication request from the authentication request client 151 of the user who is going to be authenticated, and authenticates the user online (for example, Patent Documents). 1). The online user authentication system 100 is mainly composed of an online authentication server 101 that performs user authentication and an authentication request client 151 that is a terminal from which the user requests authentication. The online authentication server 101 includes a one-time password derivation rule storage unit 102, a user ID reception unit 103, a pattern generation unit 104, a pattern transmission unit 105, a verification code generation unit 106, a one-time password reception unit 107, And user authentication means 108. The authentication request client 151 includes a user ID input unit 152, a user ID transmission unit 153, a pattern reception unit 154, a pattern display unit 155, a one-time password input unit 156, and a one-time password transmission unit 157. The

  The authentication request client 151 includes a user ID input unit 152, a user ID transmission unit 153, a pattern reception unit 154, a pattern display unit 155, a one-time password input unit 156, and a one-time password transmission unit 157. The

  In the online authentication server 101, the one-time password derivation rule storage unit 102 stores a user ID 102a and a one-time password derivation rule 102b in advance in association with each other. The user ID receiving unit 103 receives the user ID 181 of the user who is going to be authenticated from the authentication request client 151. The pattern generation means 104 generates a pattern element sequence 190 that is an array of pattern elements included in the matrix-shaped presentation pattern 191 according to a predetermined generation rule such as a pseudo random number. The pattern transmission unit 105 transmits the generated pattern element sequence 190 to the authentication request client 151.

  A user who wants to receive authentication inputs his / her user ID 181 from the user ID input means 152 such as a keyboard in the authentication request client 151. The user ID transmission unit 153 transmits the input user ID 181 to the online authentication server 101. In the online authentication server 101, the user ID receiving unit 103 receives the user ID 181. The pattern generation means 104 generates a pattern element sequence 190 that is a sequence of random numbers constituting the matrix-shaped presentation pattern 191 according to a predetermined generation rule. The pattern transmission unit 105 transmits the generated pattern element sequence 190 to the authentication request client 151. In the authentication request client 151, the pattern receiving unit 154 receives the pattern element sequence 154. The pattern display means 155 generates the presentation pattern 191 by arranging the pattern elements included in the received pattern element sequence 190 in the predetermined pattern 191p, and displays it on the screen.

  FIG. 16 is a conceptual diagram of a method for generating a presentation pattern 191 in the conventional online user authentication system 100. FIG. 16 illustrates a presentation pattern 191 in which one-digit numbers from 0 to 9 are used as pattern elements, and each pattern element is arranged at each element position of a pattern composed of four 4 × 4 matrices. Yes. The online authentication server 101 generates 64 single-digit numbers, which are pattern elements included in the presentation pattern 191, using a random number generation algorithm, and transmits a pattern element sequence 190 in which the numbers are arranged to the authentication request client 151. The authentication request client 151 receives the pattern element sequence 190 from the online authentication server 101, and assigns each pattern element included in the pattern element sequence 190 to the shape of a predetermined pattern 191p, in this case, in the position of each element of four 4 × 4 matrices. The presentation pattern 191 is generated by arranging them on the screen and displayed on the screen.

  FIG. 13 is a conceptual diagram of a one-time password input method in the matrix authentication method. By applying the one-time password derivation rule 102b to the presentation pattern 191, the user sequentially extracts numbers displayed at predetermined positions on the matrix and inputs them from the one-time password input means 156. It is also possible to input numbers without being based on the presentation pattern 191. That is, the fixed password component can be included in the one-time password. These numbers are input using a pointing device such as a mouse or a touch panel or a keyboard 196. In FIG. 13, an arrow and a circle indicated by a broken line indicate that a one-time password based on the presentation pattern 191 is input from the keyboard 196. The one-time password transmission unit 157 transmits the input one-time password 192 to the online authentication server 101. In the online authentication server 101, the one-time password receiving unit 107 receives the one-time password 192. The verification code generation unit 106 generates a verification code 193 that is a result of applying the one-time password derivation rule 102b associated with the received user ID 181 to the pattern elements of the presentation pattern 191 configured by the transmitted pattern element sequence 190. To do. The user authentication means 108 compares the received one-time password 192 with the verification code 193, and if they are equal, the user is successfully authenticated.

International Publication WO03 / 069490 Pamphlet (Page 10, Lines 2-14) Tides Onishi & ASSOCIATES IT Survey Meeting, "Mobile Management Techniques Learned from Base Technology", IT SELECT, Media Select Inc., February 1, 2002, p.56-p.60

  In the conventional online user authentication system 100, the online authentication server 101 receives an authentication request from the authentication request client 151 of the user who is going to be authenticated, and authenticates the user. As described above, in the conventional online user authentication system 100, the user authentication cannot be performed only by the client, and the authentication server connected to the network needs to perform the user authentication. Therefore, the conventional matrix authentication is mainly used online for permitting use of resources on the network, and is not used offline for permitting use of resources of the computer itself. On the other hand, such offline authentication needs existed.

  Here, even if the configuration corresponding to the one-time password derivation rule storage unit 102, the pattern generation means 104, the verification code generation means 106, and the user authentication means 108 is simply moved from the server side to the client side, the security is ensured offline. Authentication cannot be performed. That is, when the one-time password derivation rule 102b that functions as a password is stored in the client, unlike the normal password, the one-time password derivation rule 102b cannot be hashed using a hash function operation. It is. Specifically, in order to generate the verification code 193, it is necessary to apply a specific one-time password derivation rule 102b to the presentation pattern 191, but when the one-time password derivation rule 102b is hashed and stored, the hash This is because the one-time password derivation rule 102b cannot be restored from the converted one, and therefore the verification code 193 cannot be generated. Therefore, there is a need for an off-line matrix authentication system that does not have such a problem and ensures security.

  The present invention has been made in view of the above problems, and has the following characteristics. That is, the present invention presents a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated, and generates a one-time password by applying it to a pattern element at a specific position included in the presentation pattern. An offline user authentication system that uses a one-time password derivation rule for performing offline password of the user, and includes an offline authentication support server and an offline authentication client, and the offline authentication support server constitutes a presentation pattern A plurality of pattern element sequences that are a set of pattern elements are generated according to a predetermined generation rule, and the one-time password derivation rule of the user is set corresponding to each of the presented patterns based on each of the generated pattern element sequences. Each putter A plurality of verification codes that perform one-way function operation on the result applied to the above are generated, and the plurality of pattern element sequences and verification codes are transmitted to the offline authentication client. One is selected to display a presentation pattern, and the one-time password inputted based on the one-time password is compared with a corresponding verification code to perform user authentication. And

  The present invention can be configured such that the offline authentication client receives a pattern seed value defining the pattern element string together with the input user ID from the offline authentication support server, instead of the pattern element string.

  The present invention can be configured not to reuse a pattern element string or a pattern seed value that has been used once by an offline authentication client.

  The present invention is configured such that the offline authentication support server is operated immediately after the offline authentication client has succeeded in the user authentication using the user ID to the network between the offline authentication support server and the online authentication support server. it can.

  In the present invention, the one-time password derivation rule is a combination of each position of the selected pattern element included in the presentation pattern and the order in which the positions of the respective pattern elements are selected, or Each position of the selected pattern element included in the presentation pattern and each of the characters input without being based on the presentation pattern, and the position of the respective pattern element and the order in which the respective characters are selected or input It can be configured to be a combination of

  The present invention can be configured such that each pattern element included in the presentation pattern is selected from numbers and symbols from 0 to 9, or is selected from numbers from 0 to 9. .

  In the present invention, the predetermined pattern in which a plurality of pattern elements included in the presentation pattern is arranged is a matrix in which the pattern elements are arranged so as to form a square as a whole at respective positions of m vertical × n horizontal. Can be configured to include.

  In the invention described above or in the claims, terms such as server and client are not intended to limit the specific form or specific name of the apparatus, but to represent the apparatus having its general functions. It is. A function of one component may be realized by two or more physical configurations, and a function of two or more components may be realized by one physical configuration. The invention of the system can be grasped as an invention of a method in which the functions of each component are sequentially executed, and vice versa. In the method invention, the steps are not limited to being performed in the order described, but can be performed in any order as long as the overall function can be performed consistently. . These inventions are also established as a program that realizes a predetermined function in cooperation with predetermined hardware, and also as a recording medium that records the program. The present invention can also be realized as a computer data signal embodied on a carrier wave and having a program code.

  The present invention is a user authentication system that uses a derivation rule for generating a one-time password by presenting a presentation pattern to a user to be authenticated and applying it to an element at a specific position included therein, and is offline In the authentication client, a plurality of pattern element sequences constituting a presentation pattern, and a plurality of verification codes obtained by performing a one-way function operation on the result of applying a derivation rule to each of the presentation patterns are stored in the client. A presentation pattern is generated by selecting one of the stored pattern element sequences, and authentication is performed by comparing the input one-time password obtained by performing the one-way function operation with a corresponding verification code The presentation pattern is displayed on the offline authentication client. On the other hand, since the password itself is not stored and the verification code for verifying the password is hashed and stored, even if the client PC is analyzed, it is offline with high security so that password leakage does not occur It has the effect that the matrix authentication can be realized. Further, the present invention has an effect that higher security can be secured against a brute force attack because a pattern element sequence used once for user authentication can be prevented from being reused.

  Furthermore, the present invention can be configured to generate and display a presentation pattern according to a predetermined pattern element sequence generation rule based on the input user ID and the stored pattern seed value in the offline authentication client. Even when the PC is analyzed and the pattern seed value and the pattern element sequence generation rule are leaked to a malicious third party, the presentation pattern cannot be generated unless the user ID is known, and high security can be secured. Have

  Further, according to the present invention, the offline authentication support server can be operated immediately after the user authentication using the user ID to the network between the offline authentication client and the offline authentication support server has succeeded and is brought online. Since it can be configured, online and offline logon authentication can be performed seamlessly, and verification data for offline authentication can be automatically transmitted to an appropriate user of the network.

Embodiment of the present invention
The present invention will now be described. In the present invention, information that can generate a plurality of presentation patterns and a plurality of verification codes corresponding to the respective presentation patterns are stored in the client in advance, and the presentation patterns are displayed on the client based on the information. The one-time password is input from the user, and the one-time function is applied to the one-time password and the verification code is compared with the user to authenticate the user. A first embodiment that uses a pattern element sequence that constitutes a presentation pattern as information that can generate a presentation pattern stored in the client, and a pattern seed value that is combined with an input user ID to generate a pattern element sequence There is a second embodiment using. The offline user authentication system 200 according to the first embodiment of the present invention is an embodiment in which a pattern element sequence 290 constituting a presentation pattern 291 is stored in an offline authentication client 251. The offline user authentication system 300 according to the second embodiment of the present invention is an embodiment in which a pattern seed value 383 that forms a presentation pattern 391 in combination with an input user ID 381 is stored in the offline authentication client 351. First, the outline of the user authentication method according to the present invention common to all the embodiments will be described, and then the first embodiment and the second embodiment will be described.

  In the present specification, a state in which a user is connected as an appropriate network user to the same network as the offline authentication support servers 201 and 301 using the offline authentication clients 251 and 351 is referred to as online. In order for a user to use the offline authentication clients 251 and 351 in an online state, it is necessary to obtain permission to use the resources of the network. Therefore, when the network is managed as a domain, the user's domain network Logon authentication to is required. A state where the user uses the offline authentication clients 251 and 351 as appropriate users but is not connected to the same network as the offline authentication support servers 201 and 301 is referred to as offline. Even in an offline state, in the case of a Windows (registered trademark, hereinafter the same) network, it is possible to log on as a domain network user, and it is also possible to log on with a local computer user. In order for a user to use the offline authentication clients 251 and 351 in an offline state, the user needs to receive logon authentication to the domain network or the computer.

[User Authentication Method According to the Present Invention]
The user authentication method according to the present invention will now be described with reference to the drawings. In the drawing, regarding the corresponding components between the conventional online user authentication system 100 and the offline user authentication systems 200 and 300 according to the present invention, the last two digits of the attached reference numbers are the same. 1 and 2 are hardware configuration diagrams, FIGS. 3 and 4 are block diagrams, and FIGS. 5 to 8 are operation flow diagrams. First, an overview of a user authentication method according to the present invention will be described. The user authentication method according to the present invention is matrix authentication which is a kind of challenge-response authentication method as described above. In any of the embodiments, the user authentication method according to the present invention presents a plurality of pattern elements arranged in a predetermined pattern as presentation patterns 291 and 391 to users who are authenticated by the offline authentication clients 251 and 351, and the presentation patterns. One-time password derivation rules 202b and 302b for generating one-time passwords 292 and 392 by applying to the pattern elements at specific positions included in 291 and 391 are used as the password of the user. .

  In the first embodiment, a plurality of pattern element sequences 290 that are information used when generating the presentation pattern 291 presented to the user in the offline authentication client 251 are generated in advance in the offline authentication support server 201 and are offline. It is transmitted to the authentication client 251 via a network or other storage medium and stored in advance. The verification code 293 for verifying whether or not the one-time password 292 input to the offline authentication client 251 is valid is a one-time password that is the password of the user for each of the presentation patterns 291 formed from the pattern element sequence 290. By performing one-way function calculation on the result of applying the password derivation rule 202b, a plurality of items are generated in advance by the offline authentication support server 201, and transmitted to and stored in the offline authentication client 251 via a network or other storage medium.

  In the second embodiment, a plurality of pattern seed values 383, which are information used when generating the presentation pattern 391 presented to the user in the offline authentication client 351, are generated in advance in the offline authentication support server 301, and are offline. It is transmitted to the authentication client 351 via a network or other storage medium and stored in advance. The presentation pattern 391 is generated according to a predetermined generation rule based on the pattern seed value 383 and the input user ID. A verification code 393 for verifying whether the one-time password 392 input to the offline authentication client 351 is valid is a pattern element sequence generated based on each of the pattern seed values 383 and the input user ID. The offline authentication support server 301 generates a plurality of items in advance by performing one-way function calculation on the result of applying the one-time password derivation rule 302b that is the password of the user to each of the presentation patterns 391 composed of 390, and offline authentication The data is transmitted to the client 351 via a network or other storage medium and stored.

  In any embodiment, the offline authentication clients 251 and 351 select and display one of the presentation patterns 291 and 391 that can be generated. The user inputs the one-time passwords 292 and 392 by applying his / her one-time password derivation rules 202b and 302b to the displayed presentation patterns 291 and 391. The offline authentication clients 251 and 351 execute the same one-way function calculation as that used when generating the verification codes 293 and 393 on the input one-time passwords 292 and 392, and the corresponding verification codes 293 and 393 If they are equal, the user is successfully authenticated.

  The terms used in this specification will be described below.

[Terminology-Presentation patterns and pattern elements]
A presentation pattern is a pattern in which pattern elements are arranged in a predetermined pattern. Typical examples of the predetermined pattern include a matrix arranged so as to form a square as a whole at each of vertical m × n horizontal positions, and a plurality of such matrices arranged. The shape of the figure can be made. In this specification, even when a presentation pattern having a shape other than the typical matrix shape is used, it is called a matrix authentication method. As the predetermined pattern, a regular shape or an impressive shape is easy to remain in the user's memory, and is therefore preferable because the user can easily store the one-time password derivation rules 202b and 302b that are passwords.

  A pattern element is an element arranged at a predetermined position so as to constitute a predetermined pattern in a presentation pattern, and is preferably a one-digit number from 0 to 9, but in addition, an alphabet, a symbol, etc. Can be any character. As symbols, “+”, “−”, “*”, “=”, “_”, “!”, “?”, “#”, “$” Assigned to the standard keyboard of the PC. Symbols such as “,” and “&” are particularly suitable. You can also use graphics, illustrations, photographs, and other designs as characters. Preferably, a plurality of the same pattern elements are displayed in the presentation pattern. In this way, the one-time password derivation rules 202b and 302b that are passwords and the one-time passwords 292 and 392 that are the results of applying the one-time password derivation rules 202b and 302b to the presentation patterns 291 and 391 are many-to-one. In response, one-way passwords 292 and 392 are automatically unidirectionally entered. Therefore, even if the presentation patterns 291 and 391 are specified from only one one-time password 292 and 392, the one-time password derivation rules 202b and 302b cannot be specified.

  In the present embodiment, as shown in FIG. 13 or the like, a single digit number from 0 to 9 is used as a pattern element, and each pattern element is arranged in predetermined patterns 291p and 391p composed of four 4 × 4 matrices. Are presented patterns 291 and 391. When the screen area is small, such as a mobile phone, it is preferable to use a presentation pattern in which the number of 4 × 4 matrices is reduced to three.

[Terminology-Pattern element sequence]
The pattern element columns 290 and 390 are data representing the contents of elements arranged in the predetermined patterns 291p and 391p in order to generate the presentation patterns 291 and 391, and are typically all included in the presentation patterns 291 and 391. Are arranged in order. The pattern element sequences 290 and 390 are generated before the presentation patterns 291 and 391 are generated. The pattern element sequences 290 and 390 do not have to be a single character string in which pattern elements are arranged in order, but include data on all pattern elements included in one presentation pattern 291 and 391. Means. Therefore, as long as each pattern element included in the pattern element sequences 290 and 390 is associated with each position in the presentation pattern, the order of the pattern elements included in the pattern element sequences 290 and 390 is arbitrary. The pattern element sequences 290 and 390 may be divided into a plurality of data.

[Terminology-Pattern Element Sequence in First Embodiment]
In the offline user authentication system 200 according to the first embodiment, the pattern element sequence 290 is generated in the offline authentication support server 201 and then sent to the offline authentication client 251 via a network, USB memory, floppy (registered trademark). ) It is transmitted through a storage medium such as a disk and stored there.

[Terminology-Pattern Element Sequence in Second Embodiment]
In the offline user authentication system 300 according to the second embodiment, the pattern element sequence 390 is only generated in the offline authentication client 351 and used to generate the presentation pattern 391. It is not transmitted over the network.

[Terminology-One-time password derivation rules]
The one-time password derivation rules 202b and 302b are rules for generating the one-time passwords 292 and 393 by applying to the pattern elements at specific positions included in the presentation patterns 291 and 391. It is functional data. The rule applied to the pattern element is typically a pattern element at which position is selected in which order. In this case, the one-time password derivation rules 202b and 302b are information on combinations of the positions of the selected pattern elements included in the presentation patterns 291 and 391 and the order in which the respective pattern elements are selected. The one-time password derivation rules 202b and 302b may include character information such as numbers input without being based on the presentation patterns 291 and 391. In this case, the one-time password derivation rules 202b and 302b The position of each of the selected pattern elements included in the patterns 291 and 391 and each of the characters input without being based on the presenting patterns 291 and 391 and the position of each of the pattern elements and the respective characters are selected or This is combination information with the order of input. That is, a fixed password component that is not based on the presentation patterns 291 and 391 can be included in the one-time password.

  FIG. 12 shows the structure of typical one-time password derivation rules 202b and 302b. In this embodiment, a one-digit number from 0 to 9 is used as a pattern element, and each pattern element is arranged at the position of each element of a predetermined pattern 291p, 391p composed of four 4 × 4 matrices. , 391, one-time password derivation rules 202b and 302b are illustrated. In FIG. 12, the positions of the respective elements of the predetermined patterns 291p and 391p are distinguished and displayed by numbers from 01 to 64. When the presentation patterns 291 and 391 are displayed to a user who is going to be authenticated, a single-digit number from 0 to 9 is displayed at the position of each element of the predetermined patterns 291p and 391p.

  The input one-time passwords 292 and 392 preferably use numbers based on the presentation patterns 291 and 391 and numbers input without being based on the numbers. Since the number of pattern elements included in the presentation patterns 291 and 391 is 64, the selection of the positions of the pattern elements included in the presentation patterns 291 and 391 indicates that 01 to 64 assigned to the respective positions. Up to two digits are represented. Then, for the numbers that are input without being based on the presentation patterns 291 and 391, the number “9” indicating such a number is assigned first, and then the one-digit number that is input next is assigned. It is represented by a two-digit number. In the example of FIG. 12, the first four numbers of the one-time passwords 292 and 392 are input by selecting a pattern element at a specific position of the presentation patterns 291 and 391. As portions corresponding to those of the one-time password derivation rules 202b and 302b, numbers “01”, “16”, “29”, and “20” representing their positions are arranged in that order. The selected pattern element is input by keyboards 296, 396 or a pointing device. The next two numbers of the one-time passwords 292 and 392 are fixed password components that are not based on the presentation patterns 291 and 391 but are input from the keyboards 296 and 396. As the portions corresponding to those of the one-time password derivation rules 202b and 302b, the numbers “2” and “9” that are input are added after the number “9” representing the fixed password component, respectively. “92” and “99” are subsequently arranged in that order. The next last digit of the one-time passwords 292 and 392 is input by selecting a pattern element at a specific position of the presentation patterns 291 and 391. As a portion corresponding to that of the one-time password derivation rules 202b and 302b, a number “33” representing the position thereof is subsequently arranged, and the one-time password derivation rules 202b and 302b end here. The one-time password derivation rules 202b and 302b may be further appended with an end mark that uniquely identifies the end point thereof, for example, a number such as “00”, or the one-time password derivation rules 202b. , 302b may be associated with a numerical value indicating the overall length.

[Terminology-Pattern seed value]
The pattern seed value 383 is used only in the second embodiment. The pattern seed value 383 is a value that uniquely determines a pattern element included in one presentation pattern 391 in combination with the input user ID 381, and is a constant generated within a predetermined range by a predetermined generation rule. In order to display the presentation pattern 391, the offline authentication client 351 needs to store information for generating it. In the first embodiment, the offline authentication client 251 stores a pattern element sequence 290 that constitutes the presentation pattern 291. With such a configuration, when a malicious third party analyzes the offline authentication client 251, a pattern is displayed. The element string 290 is specified, and thus the presentation pattern 291 may be specified. This is not preferable for security. In order to prevent this, it is conceivable that the pattern element sequence 290 is not stored. On the other hand, in order to perform authentication by the offline authentication client 351, it is necessary to be able to generate and display the presentation pattern 391.

  In response to such conflicting requests, the presentation pattern 391 is uniquely determined, but it is conceivable to store the presentation pattern specifying information, which is not the pattern element sequence 390 itself, in the offline authentication client 351. In the offline authentication client 351, the presentation pattern 391 is generated according to a predetermined rule from the stored presentation pattern specifying information. As the predetermined rule, for example, a hash function operation can be considered. In this case, since the pattern element sequence 290 itself is not stored, security is improved. However, even in such a configuration, once the algorithm for generating the presentation pattern 391 from the presentation pattern identification information implemented in the offline authentication client 351 is analyzed by a malicious third party, the malicious third party When the presentation pattern specifying information is acquired by the analysis of the offline authentication client 351, the presentation pattern 391 can be generated therefrom. Therefore, even in a user authentication system that employs such presentation pattern specifying information, a situation that is still not preferable for security can be considered.

  In the second embodiment of the present invention, the offline authentication client 351 does not store the pattern element sequence 390 itself, but stores a pattern seed value 383 instead. This pattern seed value 383 is combined with the input user ID 381 input from the user in the offline authentication client 351 to uniquely determine the presentation pattern 391. That is, the pattern seed value 383 cannot uniquely determine the presentation pattern 391 by itself, but inevitably determines the presentation pattern 391 when combined with the input user ID 381 that the user inputs in the authentication request client 351. can do. Therefore, even if the pattern seed value 383 is acquired by a malicious third party by analysis of the offline authentication client 351, first, the pattern seed value 383 does not represent the presentation pattern 391 itself. In addition, even if the algorithm for generating the presentation pattern 391 from the input user ID 381 and the pattern seed value 383 is analyzed, if the input user ID 381 is not known, the presentation pattern 391 cannot be estimated. Impossible. By adopting such a configuration, in the second embodiment, it is possible to make it extremely difficult to guess the presentation pattern 391 displayed on the offline authentication client 351 by analysis of the offline authentication client 351. High security is provided.

  The pattern seed value 383 is typically a numerical value within a predetermined range generated by a random number generation algorithm. As long as the pattern seed value 383 is a numerical value within a predetermined range, it may be generated by generation rules other than the random number generation algorithm, for example, by counting up or counting down every predetermined value from a predetermined initial value.

[Terminology-One-time password]
The one-time passwords 292 and 392 are disposable passwords that are generated and input when a user who wants to be authenticated applies his / her one-time password derivation rules 202b and 302b to the presentation patterns 291 and 391. FIG. 13 is a conceptual diagram of a one-time password input method in the matrix authentication method. The one-time password derivation rules 202b and 302b used in FIG. 13 are the same as those shown in FIG. The user selects a pattern element at a predetermined position included in the presentation patterns 291 and 391 and inputs a predetermined number not based on the presentation patterns 291 and 391 in a predetermined order according to his / her one-time password derivation rules 202b and 302b. By executing the above, “254290” is generated and input as the one-time passwords 292 and 392.

[Terminology-Verification code]
The verification codes 293 and 393 are data for verifying the validity of the input one-time passwords 292 and 392. The verification codes 293 and 393 are specific information included in each of the plurality of presentation patterns 291 and 391 that can be displayed on the offline authentication client 251 and 351 based on the plurality of pattern element strings 290 or the plurality of pattern seed values 383. A one-way function calculation is performed on the result of applying the user's own one-time password derivation rules 202b and 302b to the position pattern elements. That is, the verification codes 293 and 393 are correct one-time passwords 292 and 392 that are the result of applying the correct one-time password derivation rules 202b and 302b associated with the user who is going to be authenticated to the correct presentation patterns 291 and 391. One-way function calculation is performed on the same value as. Therefore, the same number of verification codes 293 and 393 as the displayable presentation patterns 291 and 391 are generated and stored in the offline authentication clients 251 and 351. At the time of user authentication in the offline authentication clients 251 and 351, the same one-way function calculation as that used when generating the verification codes 293 and 393 is applied to the one-time passwords 292 and 392 input based on the presented presentation patterns 291 and 391. The validity of the one-time passwords 292 and 392 is verified by comparing the implemented value with the verification codes 293 and 393 corresponding to the presentation patterns 291 and 391. Here, even if the verification code is not hashed, the validity of the one-time passwords 292 and 392 can naturally be verified. However, since such a verification code is equal to the correct one-time password 292, 392, when the client PC is analyzed by a malicious third party, the presentation pattern 291, 391 and the correct one-time password 292, There is a problem that a plurality of 392 pairs are known, and the one-time password derivation rules 202b and 302b, which are passwords, are specified. Since the verification codes 293 and 393 are hashed, the correct one-time passwords 292 and 392 cannot be specified from the verification codes 293 and 393, and the client PC is analyzed by a malicious third party. However, the one-time password derivation rules 202b and 302b, which are passwords, never leak.

[Terminology-one-way function and hash function]
A one-way function is a function in which an output value applied to a certain input value can be easily calculated, but it is extremely difficult to obtain the original input value from the output value. The hash function refers to a function having a one-way characteristic that is a characteristic of the one-way function, and having a collision resistance that the probability that the output values are the same when the original input values are different is extremely small. The hash function normally generates a certain range of output values regardless of the input value. The one-way function is a concept that includes a hash function, and the one-way function and the hash function can be used almost in the same way, but when higher collision tolerance is required due to a large range of input values, etc. It is preferable to use a hash function. In the present invention, it is naturally possible to use a hash function instead of a one-way function, but it is also possible to use a one-way function instead of a hash function.

[Hardware Configuration of Offline User Authentication System 200 According to First Embodiment]
Next, the configuration of the offline user authentication system 200 according to the first embodiment of the present invention will be described. FIG. 1 is a hardware configuration diagram of an offline user authentication system 200 according to an embodiment of the present invention. Referring to FIG. 1, the offline user authentication system 200 is largely composed of an offline authentication support server 201 and an offline authentication client 251. The offline authentication support server 201 includes a CPU 201a, a RAM 201b, a storage device 201c, a user interface (I / F) 201d, and an external / network interface (I / F) 201e. The storage device 201c stores the OS 201c1 and the user authentication support application 201c2 in the storage area, and includes the password storage unit 202 in the storage area. The password storage unit 202 stores a user ID 202a and a one-time password derivation rule 202b. The offline authentication client 251 includes a CPU 251a, a RAM 251b, a storage device 251c, a user interface (I / F) 251d, and an external / network interface (I / F) 251e. The storage device 251c stores the OS 251c1 in the storage area, and includes a verification data storage unit 261 in the storage area. The OS 251c1 includes a verification data request module 251c2, a presentation pattern selection / generation module 251c3, and a verification code identification / authentication module 251c4. The verification data storage unit 261 stores a plurality of pattern element sequences 290 and a plurality of verification codes 293. The plurality of pattern element strings 290 and the plurality of verification codes 293 are collectively referred to as verification data 294.

  The offline authentication support server 201 is a component that generates in advance data necessary for performing offline user authentication in the offline authentication client 251 in the offline user authentication system 200. The offline authentication support server 201 is in the form of a server or a personal computer in which the OS 201c1, the user authentication support application 201c2, etc. are installed. The CPU 201a is a processor that performs information processing for supporting user authentication in the offline authentication client 251 by executing the OS 201c1, the user authentication support application 201c2, and the like on the OS 201c1. The RAM 201b is a memory that provides a memory space in which the software stored in the storage device 201c is read and a work area that is necessary when the read software is executed by the CPU 201a. The storage device 201c is a component that stores and manages information such as software and data, and is typically in the form of a hard disk drive or the like. The storage device 201c preferably stores program files of the OS 201c1 and the user authentication support application 201c2, and these programs are read out and executed on the RAM 201b. The storage device 201c may have a form in which the programs of the OS 201c1 and the user authentication support application 201c2 are stored in the ROM. In this case, such a ROM constitutes firmware together with a program execution element such as the CPU 201a. The user I / F 201d is a component for inputting / outputting data to / from the user. Typically, an input unit including a keyboard 296, a pointing device such as a mouse, a display for displaying information on the screen, and the like. Output means and a hardware I / F between them. The keyboard 296 can be of any form, such as a numeric keypad or a standard full keyboard, as long as it can input pattern elements constituting a one-time password. The external / network I / F 201e is an I / F for inputting / outputting information by connecting to a storage device such as a USB memory or a floppy disk drive or a network.

  The OS 201c1 and the user authentication support application 201c2 may be combined to form an integrated program. For example, the OS 251c1 may include the function of the user authentication support application 201c2. In addition, the user authentication support application 201c2 may be incorporated in another application. Each of them may be divided into a plurality of programs.

  The offline authentication support server 201 may or may not be connected to the network as long as the verification data 294 can be transmitted to the offline authentication client 251 in some form. However, preferably, the offline authentication support server 201 can be connected to the offline authentication client 251 via a network, and transmits the verification data 294 to the offline authentication client 251 in advance in an online state connected to the network. The network is preferably the Internet or an intranet operating with a TCP / IP based protocol. In the intranet, when the offline authentication client 251 operates with a client Windows OS, the network can be a Windows domain network that operates with a TCP / IP-based protocol. In this specification, Windows is described as an example of the OS. However, other OS such as Mac OS (registered trademark), Linux (registered trademark), Unix (registered trademark), and the like may be used. It is.

  When the offline authentication support server 201 is connected to the offline authentication client 251 via a network, the offline authentication support server 201 is typically placed on a network such as the Internet or an intranet, and is accessed via the network. This is a form of a Web server that provides resources for providing verification data 294 for user authentication to H.251. In this case, the verification data 294 is preferably transmitted to the offline authentication client 251 at the time of logon authentication to the network for connecting the offline authentication client 251 to the same network as the offline authentication support server 201. Logon authentication to the network is preferably the same as the user authentication method implemented in the conventional online user authentication system 100. In this case, the offline authentication support server 201 also includes the function of the online authentication server 101. It is out.

  Preferably, when the offline authentication client 251 logs on, a program for executing the user authentication method according to the present invention is activated to display a logon authentication screen. In the logon authentication screen, logon to the network and connection to the computer are performed. Configure to log on and select. With this configuration, online and offline logon authentication can be performed seamlessly, and at the time of logon authentication of the offline authentication client 251 to the network, a request for generation and transmission of verification data 294 is sent to the HTTP protocol. The offline authentication support server 201 can be transmitted using the HTTPS protocol or the like. Accordingly, the offline authentication client 251 can easily and reliably acquire the verification data 294 from the offline authentication support server 201 through the network immediately after successful logon authentication to the network.

  Alternatively, the offline authentication support server 201 may be in the form of a mail server that transmits an e-mail attached with the data of the verification data 294 to the user. In this case, the offline authentication client 251 receives the e-mail by accessing the server in which the e-mail transmitted from the authentication support server 201 to the user is stored, and the verification data 294 attached to the e-mail. To get. The data attached to the e-mail may be a file of the verification data 294 itself, or may be an executable file for installing the verification data 294. It is preferable that the offline authentication support server 201 stores the mail address of each user. The transmission of verification data 294 by e-mail is effective when it is difficult to transmit data from the authentication support server 201 through a network or a storage medium due to a long-term business trip of the user.

  When the offline authentication support server 201 is not connected to the offline authentication client 251 via the network, the offline authentication support server 201 outputs the verification data 294 to a storage medium such as a floppy disk or a USB memory through the external / network I / F 201e. The output data may be a file of the verification data 294 itself, or may be an execution format file for installing the verification data 294. The offline authentication client 251 connects the storage medium storing the verification data 294 through the external / network I / F 251e, and acquires the verification data 294 therefrom.

  The offline authentication support server 201 described above generates the verification data 294 and the offline authentication client 251 acquires and stores the generated verification data 294 before the user tries to authenticate with the offline authentication client 251. Need to be executed in advance.

  The OS 201c1 is an operating system that performs basic information processing close to the hardware of the offline authentication support server 201. The user authentication support application 201c2 is application software for generating a pattern element sequence 290 and a verification code 294 that are operated on the OS 201c1 and transmitting them to the offline authentication client 251. When the offline authentication support server 201 is in the form of a Web server, the user authentication support application 201c2 typically receives verification data 294 provided with an authentication support program in a form called by CGI or in the form of a servlet, on the Internet or an intranet. This is a Web server program provided via the Web. When the off-line authentication support server 201 is in the form of a mail server, the user authentication support application 201c2 typically includes a program for generating the verification data 294 and sends a mail with the verification data 294 via the Internet or an intranet. This is a mail server program provided. The password storage unit 202 is typically an area such as a hard disk drive, and preferably the data is stored in the password storage unit 202 as an encrypted file. The user ID 202a is data for uniquely identifying a user. An arbitrary character string can be used as the user ID 202a. As described above, the one-time password derivation rule 202b is a rule for generating a one-time password by applying it to a pattern element at a specific position included in a presentation pattern, and data that functions as a user password It is.

  The offline authentication client 251 is a component that performs authentication in an offline state in response to an authentication request from the user in the offline user authentication system 200, and includes an OS 251c1, a verification data request module 251c2, and a presentation pattern selection / generation module 251c3. , A terminal in which a verification code identification / authentication module 251c4 and the like are installed, and specifically, a PC, a mobile phone, a PDA, or the like. The CPU 251a is a processor that executes the verification data request module 251c2, the presentation pattern selection / generation module 251c3, the verification code identification / authentication module 251c4, and the like together with the OS 251c1 to perform information processing related to user authentication. The RAM 251b is a memory that provides a memory space into which the software stored in the storage device 251c is read, and a work area that is necessary when the read software is executed by the CPU 251a. The storage device 251c is a component that stores and manages information such as software and data, and typically has a form such as a hard disk drive. The storage device 251c preferably stores program files of the OS 251c1, the verification data request module 251c2, the presentation pattern selection / generation module 251c3, and the verification code identification / authentication module 251c4, and these programs are read on the RAM 251b. It is issued and executed. Note that the storage device 251c may be configured such that the OS 251c1, the verification data request module 251c2, the presentation pattern selection / generation module 251c3, and the verification code identification / authentication module 251c4 are stored in the ROM. In this case, such a ROM constitutes firmware together with a program execution element such as the CPU 251a. The user I / F 251d is a component for inputting / outputting data to / from the user. Typically, the user I / F 251d is not shown, but from a pointing device such as a keyboard 296, a mouse, a trackball, or a touch panel. Input means, output means such as a display for displaying information on the screen, and hardware I / F between them. The external / network I / F 251e is an I / F for inputting / outputting information by connecting to a storage device such as a USB memory or a floppy disk drive or a network. In a form in which the offline authentication client 251 is not connected to the offline authentication support server 201 via a network, the verification data request module 251c2 is not necessarily required.

  The OS 251 c 1, the verification data request module 251 c 2, the presentation pattern selection / generation module 251 c 3, and the verification code identification / authentication module 251 c 4 may be partly or entirely combined to form an integrated program form. . For example, the verification data request module 251c2, the presentation pattern selection / generation module 251c3, and the verification code identification / authentication module 251c4 may be integrated. Further, they may be independent applications or may be incorporated in other applications. Each of them may be divided into a plurality of programs.

  The OS 251c1 is an operating system that performs basic information processing closely related to the hardware of the offline authentication client 251 and is a basic program corresponding to the hardware of the offline authentication client 251. The OS 251c1 may be in the form of an architecture firmware conforming to the platform. The verification data request module 251c2 is a program that requests the offline authentication support server 201 to generate and transmit verification data 294 when the offline authentication client 251 logs on to the same network as the offline authentication support server 201. Is a form of a module called by the OS 251c1 at the time of log-on authentication to the network. The presentation pattern selection / generation module 251c3 selects one pattern element string 290 from a plurality of pattern element strings 290 included in the verification data 294 and operates with the OS 251c1, and generates a presentation pattern 291 based on the selected pattern element string 290. Typically, it is in the form of a module that is called by the OS 251c1 at the time of logon authentication to the computer. The generated presentation pattern 291 is displayed on the screen by the OS 251c1. The verification code identification / authentication module 251c4 specifies one verification code 293 corresponding to the presentation pattern 291 displayed from the plurality of verification codes 293 included in the verification data 294, which operates together with the OS 251c1, and tries to receive authentication. Is a program that compares the one-time password 292 input by the user through the OS 251c1 with the specified verification code 293, and if they are equal, the user is successfully authenticated. Typically, the OS 251c1 authenticates logon to the computer. It is a form of module that is sometimes called. The verification data request module 251c2, the presentation pattern selection / generation module 251c3, and the verification code identification / authentication module 251c4 may be in the form of firmware with an architecture according to the platform.

  Typically, the OS 251c1 is a client Windows OS, and the verification data request module 251c2 requests verification data when online such as when logging on to the network, and provides a presentation pattern selection / generation module 251c3 and a verification code specification / The authentication module 251c4 displays the presentation pattern 291 on the computer logon authentication screen to request authentication from the user, and performs user authentication based on the authentication method according to the present invention. As described above, it is preferable to perform user authentication based on the authentication method according to the present invention instead of the standard Windows logon authentication.

The change of the logon authentication screen to standard Windows is specifically performed as follows. First, a logon authentication module, which is a program for realizing the functions of the verification data request module 251c2, the presentation pattern selection / generation module 251c3, and the verification code identification / authentication module 251c4, is created as a DLL file for Windows. Here, a DLL file named “SmxGina.dll” is created. Here, the Windows logon authentication screen program is specified as key data named “GinaDLL” in the registry location shown below.

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon

The standard logon authentication module is a DLL file “msgina.dll”, which is set in the key data named “GinaDLL” described above. When the key data is rewritten to “SmxGina.dll”, the logon authentication module “SmxGinaDLL” for executing the authentication method according to the present invention is called at the time of logon authentication.

  FIG. 14 is an image diagram of logon authentication screens 297A and 297B in the offline user authentication system 200. When the logon authentication module “SmxGinaDLL” is activated at the time of Windows logon, a logon authentication screen 297A is first displayed. On the logon authentication screen 297A, a user name input field and a logon destination input field are displayed. When the offline authentication client 251 is connected to the domain network, it is possible to perform logon authentication to the Windows domain network for online use by inputting a domain name as a logon destination. When the offline authentication client 251 is not connected to the domain network, it is possible to perform logon authentication for using the computer offline as a user of the domain network by inputting the domain name at the logon destination. By inputting the computer name, logon authentication to the computer can be performed for offline use as a user of the local computer. When the user inputs his / her user ID as the input user ID 281 in the user name input field of the logon authentication screen 297A, the logon authentication screen 297B including the presentation pattern 291 is displayed next. The logon authentication screen 297B has a password input field. When a character such as a number is input as a one-time password by the keyboard 296 or a pointing device, “*” is displayed one by one in response.

[Functional Block Configuration of Offline User Authentication System 200 According to First Embodiment]
FIG. 3 is a block diagram of an offline user authentication system 200 according to an embodiment of the present invention. FIG. 3 is a diagram representing the offline user authentication system 200 having the hardware configuration shown in FIG. 1 from the viewpoint of information processing performed in cooperation between software and hardware resources. It is the figure represented by the unit of the block. In FIG. 3, the offline authentication support server 201 includes a password storage unit 202, a request reception unit 203, a pattern generation unit 204, a pattern transmission unit 205, a verification code generation unit 206, and a verification code transmission unit 211. In these functional blocks, a necessary part of the user authentication support application 201c2 is read from the storage device 201c onto the RAM 201b together with a necessary part of the OS 201c1, and the software is executed by the CPU 201a, whereby the RAM 201b, the storage device 201c, and the user I / F201d, external / network I / F201e, and other hardware elements are also implemented in appropriate cooperation.

  The password storage unit 202 is a component that stores, in advance, the user ID 202a and the one-time password derivation rule 202b that is a password of the user in association with each other, and the CPU 201a, the RAM 201b, the storage device 201c, and the like. It is a functional block realized by cooperating with software. The request receiving unit 203 is a component that receives a verification data request, which is a request for generation and output of verification data 294 for the user accompanied by information on the user ID of the user who is to be authenticated, and includes a CPU 201a, a RAM 201b, This is a functional block realized by a user I / F 201d or an external / network I / F 201e cooperating with software. The verification data request may be received from the offline authentication client 251 through the network, or may be directly input to the offline authentication support server 201 through the user I / F 201d. The pattern generation means 204 is a component that generates a plurality of pattern element sequences 290 including information on the contents of pattern elements constituting the presentation pattern 291 according to a predetermined generation rule such as a random number generation algorithm. The CPU 201a, the RAM 201b, etc. It is a functional block realized by cooperating. The pattern transmission unit 205 is a component that outputs a plurality of generated pattern element sequences 290 to be stored in the offline authentication client 251. The CPU 201a, the RAM 201b, the user I / F 201d, the external / network I / F 201e, etc. Is a functional block realized by cooperating with software. The plurality of pattern element sequences 290 may be transmitted to the offline authentication client 251 through the network, or may be output to a storage medium. The verification code generation unit 206 displays on the offline authentication client 251 the one-time password derivation rule 202b that is a password of the user associated with the user having the input user ID 281 input through the request reception unit 203. Is a component that generates a plurality of verification codes 293 that are obtained by performing a one-way function operation on the result applied to the presentation pattern 291 configured from a plurality of generated pattern element sequences 290, such as the CPU 201a and the RAM 201b. Is a functional block realized by cooperating with software. The verification code transmission unit 211 is a component that outputs a plurality of generated verification codes 293 for storage in the offline authentication client 251. The CPU 201a, the RAM 201b, the user I / F 201d, the external / network I / F 201e, etc. are software. Is a functional block realized by cooperating with. The plurality of verification codes 293 may be transmitted to the offline authentication client 251 through the network, or may be output to a storage medium.

  The offline authentication client 251 includes a user ID input unit 252, a verification data request unit 253, a pattern reception unit 254, a pattern display unit 255, a one-time password input unit 256, a verification data storage unit 261, a verification code reception unit 262, and a pattern selection unit. 263, verification code specifying means 264, and user authentication means 265. These functional blocks are stored in the RAM 251b, the storage device when the necessary part of the browser application 201c2 and the presentation pattern generation module 251c3 are read together with the necessary part of the OS 251c1 from the storage device 251c onto the RAM 251b and the software is executed by the CPU 251a. It is realized by appropriately cooperating with hardware elements such as 251c, user I / F 251d, external / network I / F 251e. When the offline authentication client 251 does not acquire the verification data 294 from the offline authentication support server 201 via the network, the verification data request unit 253 is not necessarily required.

  The user ID input unit 252 is a component that receives an input with the user ID of the user who is going to be authenticated as the input user ID 281, and is realized by the CPU 251 a, the RAM 251 b, the user I / F 251 d, etc. cooperating with the software. It is a functional block. When the user performs logon authentication to the network in order to use the offline authentication client 251 online, the input user ID 281 is transmitted to the verification data request means 253, and the verification data request is transmitted thereto. The verification data request unit 253 is a component that transmits a verification data request including information of the input user ID 281 input to the offline authentication support server 201. The CPU 251a, the RAM 251b, the external / network I / F 251e, etc. cooperate with the software. It is a functional block realized by doing. The pattern receiving unit 254 is a component that acquires a plurality of pattern element sequences 290 that constitute the verification data 294 generated by the offline authentication support server 201, and is a CPU 251a, RAM 251b, user I / F 251d, or external / network I / F 251e. Are functional blocks realized by cooperating with software. The plurality of pattern element sequences 290 may be acquired from the offline authentication support server 201 through a network, or may be acquired from a storage medium that stores them. The pattern display unit 255 is a component that generates the presentation pattern 291 by arranging the pattern elements of the pattern element sequence 290 selected by the pattern selection unit 263 in a predetermined pattern 291p, and displays it on the screen. The CPU 251a and the RAM 251b This is a functional block realized by the user I / F 251d and the like cooperating with software. The one-time password input unit 256 is a component that receives input from the user of the one-time password 292 through the presentation pattern 291 displayed on the screen, and the CPU 251a, RAM 251b, user I / F 251d, etc. cooperate with the software. Is a functional block realized by The verification data storage unit 261 is a component that stores verification data 294 including a plurality of pattern element sequences 290 and a plurality of verification codes 293 for a certain user in association with the user ID 202a of the user, and the CPU 201a, The RAM 201b, the storage device 201c, and the like are functional blocks realized by cooperating with software. The verification data 294 stored in the verification data storage unit 261 is acquired from the pattern receiving unit 254 and the verification code receiving unit 262, and the user ID used when acquiring them is associated and stored as the user ID 202a. . The verification data storage unit 261 can store verification data 294 of a plurality of users. The verification code receiving means 262 is a component that obtains a plurality of verification codes 293 constituting the verification data 294 generated by the offline authentication support server 201, and is a CPU 251a, RAM 251b, user I / F 251d or external / network I / F. Are functional blocks realized by cooperating with software. The plurality of verification codes 293 may be acquired from the offline authentication support server 201 through a network, or may be acquired from a storage medium that stores them. The pattern selection unit 263 confirms whether or not a user ID equal to the input user ID 281 is stored in the user ID 202a. If there is a user ID equal to the input user ID 281, the verification data 294 associated with the user ID. The component element 290 for selecting the pattern element string 290 for generating the presentation pattern 291 by selecting one from a plurality of pattern element strings 290 included in the predetermined rule, and includes a CPU 251a, a RAM 251b, and a storage device 251c and the like are functional blocks realized by cooperating with software. The verification code specifying unit 264 is a component that specifies the verification code 293 corresponding to the pattern element sequence 290 selected by the pattern selection unit 263, and is realized by the CPU 251a, the RAM 251b, the storage device 251c, and the like cooperating with software. Function block. The user authentication means 265 compares the input verification code 293 with the one-time function 292 that has been subjected to the same one-way function calculation as that used when generating the verification code 293, and the identified verification code 293 is equal. This is a component that makes the user authentication successful, and is a functional block realized by the CPU 201a, the RAM 201b, etc. cooperating with the software.

  In the present embodiment, the offline user authentication system 200 specifically has the following configuration. The offline authentication support server 201 has the function of the online authentication server 101 of the conventional online user authentication system 100, and the user authentication through the network of the offline authentication client 251 is performed by this function. The offline authentication client 251 operates on a client Windows OS. When a user logs on to Windows, the logon authentication module “SmxGinaDLL” is activated, and a logon authentication screen 297A is displayed first. When the offline authentication client 251 is connected to the domain network and the domain name is specified as the logon destination on the logon authentication screen 297A and authentication to the network is requested, the logon authentication screen 297B is subsequently displayed. When the user authentication similar to that performed in the conventional online user authentication system 100 is executed and the logon authentication to the network is successful, the verification data from the offline authentication client 251 to the offline authentication support server 201 is obtained. The request is transmitted, and the offline authentication client 251 acquires the verification data 294 online from the offline authentication support server 201 in advance and stores it. When the offline authentication client 251 is not connected to the domain network and the logon authentication screen 297A designates the domain name or the computer name as the logon destination and the computer authentication is requested, the logon authentication screen 297B continues. Is displayed, and offline user authentication according to the present invention is performed based on the verification data 294 stored in advance.

[Operation of Offline User Authentication System 200]
Now, the operation of the offline user authentication system 200 will be described. The operation of the offline user authentication system 200 can be roughly divided into two stages. One stage is a stage in which the offline authentication client 251 causes the offline authentication support server 201 to generate verification data 294 for a user who will receive user authentication, and obtain and store it in advance. The other stage is a stage where the offline authentication client 251 performs offline user authentication based on the verification data 294 stored in advance for the user who is going to receive user authentication.

[Operation (1) of Offline User Authentication System 200-Acquisition of Verification Data]
First, an operation flow for acquiring the verification data 294 will be described. FIG. 5 is an operation flowchart for obtaining verification data of the offline user authentication system 200. First, a user who is to be authenticated by the offline user authentication system 200 inputs and registers the user ID 202a and the one-time password derivation rule 202b, which is a password, in the offline authentication support server 201 in advance. The password storage unit 202 associates the user ID 202a of the user with the one-time password derivation rule 202b and stores them in advance prior to user authentication (step S201). The offline authentication support server 201 preferably provides a Web page or resource for registering a user ID and password on the Internet or an intranet Web, and the user can support offline authentication from a terminal such as the offline authentication client 251. Access the server 201. As a result, the offline authentication client 251 displays an input field for user ID input and a presentation pattern 291 in which numbers from 0 to 9 are randomly arranged as pattern elements (not shown). The user inputs the user ID 202a that he / she wishes to register in the input field. Next, the user selects a position of a pattern element included in the presentation pattern 291 or inputs a character such as a number that is not based on the presentation pattern 291 according to the one-time password derivation rule 202b that the user wants to register. The offline authentication support server 201 stores the input user ID 202a in the password storage unit 202 as the user ID of the user. On the other hand, the one-time password derivation rule 202b cannot be specified by the number string selected or input by itself. Accordingly, the offline authentication support server 201 displays different presentation patterns 291 to select or input a character such as a number according to the second password derivation rule 202b, and a character string such as the selected or input number. Is compared with the first one, and the one-time password derivation rule 202b is specified. If the second presentation pattern 291 is generated so as to be significantly different from the first presentation pattern 291, the one-time password derivation rule 202 b can be specified by the presentation of the second presentation pattern 291. When the one-time password derivation rule 202b cannot be specified by the presentation of the presentation pattern 291 twice, the presentation pattern 291 is changed and the presentation is repeated until it can be specified. As a result, each position of the selected pattern element included in the presentation pattern 291 and each character that is not based on the presentation pattern 291 and the position of each pattern element and the order in which the respective character is selected or input. A one-time password derivation rule 202b that is a combination of the The identified one-time password derivation rule 202b is stored in the password storage unit 202 in association with the user ID 202a of the user.

  Next, the user who intends to receive authentication inputs his / her user ID as the input user ID 281 through the user ID input means 252 and the user ID input means 252 in the offline authentication client 251 (step S203). Typically, the user inputs his / her user ID in the user name field on the Windows logon authentication screen 297A of the offline authentication client 251 with the offline authentication client 251 connected to the domain network, and logs on as a logon destination. Request user authentication with domain name entered. As a result, the input user ID 281 is input to the offline authentication client 251. Subsequently, a logon authentication screen 297B is displayed, and user authentication is performed by a method similar to the user authentication method performed in the conventional online user authentication system 100. If the user authentication is successful, the offline authentication client 251 then sends a request for generation and output of the verification data 294 including the input user ID 281 input to the offline authentication support server 201 by the verification data requesting unit 253 (step) S205). Typically, the logon authentication module “SmxGinaDLL” displaying the logon authentication screens 297A and 297B accesses the input user ID 281 when the offline authentication support server 201 accesses a resource for providing the verification data 294 on the network. The verification data request data including the information is transmitted. The resource is typically in the form of a Java (registered trademark) servlet accessible by the HTTPS protocol. Next, the offline authentication support server 201 receives the verification data request including the input user ID 281 transmitted from the offline authentication client 251 by the request receiving unit 203 (step S207). Typically, the offline authentication support server 201 operates the user authentication support application 201c2, thereby receiving the input user ID 281. Next, the offline authentication support server 201 causes the pattern generation unit 204 to generate a plurality of pattern element sequences 290 according to a predetermined generation rule (step S209). The predetermined generation rule is typically to generate a 64-digit random number. FIG. 9 exemplifies “25666496... 1714” as the pattern element row 290 (state before selection).

  Next, the offline authentication support server 201 receives the input received from the offline authentication client 251 by the verification code generation unit 206 in correspondence with each of the presentation patterns 291 configured by each of the generated plurality of pattern element sequences 290. A plurality of verification codes 293 are generated by performing one-way function calculation on the result of applying the one-time password derivation rule 202b associated with the user ID 281 to the pattern elements included in the respective presentation patterns 291. (Step S211). Next, the offline authentication support server 201 transmits a plurality of generated pattern element sequences 290 to the offline authentication client 251 by the pattern transmission unit 205 (step S213). Typically, the offline authentication support server 201 operates the user authentication support application 201 c 2, thereby transmitting a plurality of pattern element sequences 290 to the offline authentication client 251. Next, the offline authentication client 251 receives a plurality of pattern element sequences 290 transmitted from the offline authentication support server 201 by the pattern receiving unit 254, and stores them in the verification data storage unit 261 together with the input user ID 281 (step). S215). Typically, the logon authentication module “SmxGinaDLL” operating on the offline authentication client 251 receives and stores a plurality of pattern element sequences 290. Next, the offline authentication support server 201 transmits the generated plurality of verification codes 293 to the offline authentication client 251 by the verification code transmitting unit 211 (step S217). Typically, the offline authentication support server 201 operates the user authentication support application 201c2, thereby transmitting a plurality of verification codes 293 to the offline authentication client 251. Next, the offline authentication client 251 receives the plurality of verification codes 293 transmitted from the offline authentication support server 201 by the verification code receiving unit 262, and stores them in the verification data storage unit 261 (step S219). Typically, the logon authentication module “SmxGinaDLL” operating on the offline authentication client 251 receives and stores a plurality of verification codes 293. Through the above operation, the verification data 294 corresponding to the input user ID 281 is stored in the offline authentication client 251 and the preparation for offline user authentication is completed.

  The verification data request can be directly input to the offline authentication support server 201. In this case, a verification data request including the input user ID 281 is input to the offline authentication support server 201, and the corresponding verification data 294 is output to a storage medium or the like. The offline authentication client 251 reads the verification data 294 from the storage medium and stores it.

[Operation (2) of Offline User Authentication System 200-User Authentication]
Next, an operation flow of offline user authentication will be described. FIG. 6 is an operation flow diagram of offline user authentication of the offline user authentication system 200. First, the user who wants to receive authentication inputs the user ID to the offline authentication client 251 through the user ID input means 252 (step S251). Typically, the user enters his / her user ID in the user name field on the Windows logon authentication screen 297A of the offline authentication client 251 in a state where the offline authentication client 251 is not connected to the domain network, and the logon destination The user ID 281 is input by making a user authentication request specifying a domain name or a computer name. Next, the offline authentication client 251 uses the pattern selection unit 263 to confirm that the input user ID 281 is included in the user ID 202a stored in the verification data storage unit 261 (step S253). Thus, it is confirmed that the verification data 294 corresponding to the user who is going to be authenticated is stored and that offline user authentication can be performed. Next, the offline authentication client 251 uses the pattern selection unit 263 to select one pattern element string 290 from a plurality of pattern element strings 290 associated with the input user ID 281 according to a predetermined rule (step S255). Preferably, the selected pattern element sequence 290 is the user's user among the plurality of stored pattern element sequences 290 until the verification data 294 is newly acquired and stored from the offline authentication support server 201 next time. Those already selected for use in authentication are not selected. By doing so, a different presentation pattern 291 can be displayed for each offline user authentication, and a brute force attack can be eliminated, so that security can be further improved. For example, when 100 pattern element sequences 290 are stored, offline user authentication can be performed 100 times continuously until new verification data 294 is acquired. When the number of pattern element rows 290 that are not selected decreases, a warning to that effect is displayed. If all the pattern element columns 290 are selected, no further new user authentication is possible. Next, the offline authentication client 251 uses the verification code specifying unit 262 to specify a verification code corresponding to the pattern element sequence 290 selected in step S255 from among the plurality of verification codes 293 associated with the input user ID 281. (Step S257). Next, the offline authentication client 251 uses the pattern display means 263 to place the presentation pattern 291 in which each pattern element of the selected pattern element sequence 290 is arranged at the position of each element of a pattern composed of four 4 × 4 matrices. Is generated and displayed on the screen of the offline authentication client 251 (step S259). Typically, as shown in FIG. 14, a logon authentication screen 297B including a presentation pattern 291 is displayed following the logon authentication screen 297A.

  Next, the user who wants to receive authentication selects a pattern element displayed at a specific position of the presentation pattern 291 displayed on the screen of the offline authentication client 251, or a character such as a number that is not based on the presentation pattern 291. Or the like, in order, the one-time password 292 that is the result of applying the one-time password derivation rule 202b to the presentation pattern 291 is input to the offline authentication client 251. The offline authentication client 251 receives an input of the one-time password 292 by the one-time password input unit 256 (step S261).

  Next, the offline authentication client 251 uses the verification code 293 specified by the user authentication means 265 to have performed the same one-way function operation as that used when generating the verification code 293 on the input one-time password 292. If they are equal, the user authentication of the user is successful (step S263).

[Hardware Configuration of Offline User Authentication System 300 According to Second Embodiment]
Next, the offline user authentication system 300 according to the second embodiment of the present invention will be described focusing on the differences from the offline user authentication system 200. The offline user authentication system 300 is different from the offline user authentication system 200 in that the pattern seed value 383 is used in the offline user authentication instead of the pattern element sequence 290, but the other configuration is substantially the same and has the same characteristics. is doing. First, the configuration of the offline user authentication system 300 according to the second embodiment of the present invention will be described. FIG. 2 is a hardware configuration diagram of the offline user authentication system 300 according to an embodiment of the present invention. Referring to FIG. 2, the offline user authentication system 300 is largely composed of an offline authentication support server 301 and an offline authentication client 351. The offline authentication support server 301 has the same configuration as the offline authentication support server 201. The offline authentication client 351 has substantially the same configuration as the offline authentication client 251, but the storage device 351 c stores a seed value selection / pattern generation module 351 c 3 in the OS 351 c 1, and the verification data storage unit 361 has a pattern. The difference is that the seed value 383 is stored. The verification data storage unit 361 stores a plurality of pattern seed values 383 and a plurality of verification codes 393. The plurality of pattern seed values 383 and the plurality of verification codes 393 are collectively referred to as verification data 394.

  Each component constituting the offline authentication support server 301 has substantially the same function as each component of the offline authentication support server 201. However, the user authentication support application 301c2 is application software for generating a pattern seed value 383 and a verification code 394 that are operated on the OS 301c1 and transmitting them to the offline authentication client 351.

  The offline authentication client 351 is a component that performs authentication in an offline state in response to an authentication request from the user in the offline user authentication system 300, and includes an OS 351c1, a verification data request module 351c2, a seed value selection / pattern generation module. The terminal 351c3, the verification code identification / authentication module 351c4, and the like are installed, and have almost the same functions as the offline authentication client 251 except for the following components.

  The seed value selection / pattern generation module 351c3 selects one pattern seed value 383 from a plurality of pattern seed values 383 included in the verification data 394, which operates together with the OS 351c1, according to a predetermined selection rule, and based on this, selects a pattern element sequence 390. And a presentation pattern 391.

[Functional Block Configuration of Offline User Authentication System 300 According to Second Embodiment]
FIG. 4 is a block diagram of an offline user authentication system 300 according to an embodiment of the present invention. FIG. 4 is a diagram representing the offline user authentication system 300 having the hardware configuration shown in FIG. 2 from the viewpoint of information processing performed in cooperation between software and hardware resources. It is the figure represented by the unit of the block. 4, the offline authentication support server 301 includes a password storage unit 302, a request receiving unit 303, a pattern seed value generating unit 321, a pattern seed value transmitting unit 322, a verification code generating unit 306, and a verification code transmitting unit 311. . In these functional blocks, a necessary part of the user authentication support application 301c2 is read from the storage device 301c onto the RAM 301b together with a necessary part of the OS 301c1, and the software is executed by the CPU 301a, whereby the RAM 301b, the storage device 301c, and the user I / F301d, external / network I / F301e, and the like are realized in cooperation with each other as appropriate.

  The password storage unit 302 and the request receiving unit 303 have the same configuration as corresponding components of the offline user authentication system 200. The pattern seed value generation means 321 is a component that generates a plurality of pattern seed values 383 that are values that define the presentation pattern 391 together with the user ID according to a predetermined generation rule, and the CPU 301a, RAM 301b, etc. cooperate with the software. It is a functional block realized by this. The pattern seed value transmission means 322 is a component that outputs the generated plurality of pattern seed values 383 for storage in the offline authentication client 351. The CPU 301a, the RAM 301b, the user I / F 301d, or the external / network I / O F301e is a functional block realized by cooperating with software. The plurality of pattern seed values 383 may be transmitted to the offline authentication client 351 through a network, or may be output to a storage medium. The verification code generation unit 306 includes a pattern element sequence 390 generated by a predetermined pattern element sequence generation rule based on the input user ID 381 input through the request reception unit 303 and the generated pattern seed value 383. The one-time function calculation is performed on the result of applying the one-time password derivation rule 302b associated with the input user ID 381 to the pattern elements included in the respective presentation patterns 391 in correspondence with the respective presentation patterns 391. It is a component that generates a plurality of verification codes 393, and is a functional block realized by the CPU 301a, RAM 301b, etc. cooperating with software. The verification code transmission unit 311 has the same configuration as the corresponding component of the offline user authentication system 200.

  The offline authentication client 351 includes a user ID input unit 352, a verification data request unit 353, a pattern display unit 355, a one-time password input unit 356, a verification data storage unit 361, a verification code receiving unit 362, a verification code specifying unit 364, and a user authentication. A means 365, a pattern seed value receiving means 371, a pattern seed value selecting means 372, and a pattern element string generating means 373 are configured. These functional blocks are stored in the RAM 351b, the storage device, when the necessary part of the browser application 301c2 and the presentation pattern generation module 351c3 are read together with the necessary part of the OS 351c1 from the storage device 351c onto the RAM 351b and the software is executed by the CPU 351a. It is realized by appropriately cooperating with hardware elements such as 351c, user I / F 351d, and external / network I / F 351e. When the offline authentication client 351 does not acquire the verification data 394 from the offline authentication support server 301 via the network, the verification data request unit 353 is not necessarily required.

  The user ID input unit 352 and the verification data request unit 353 have the same configuration as the corresponding components of the offline user authentication system 200. The pattern display unit 355 is a component that generates the presentation pattern 391 by arranging the pattern elements of the pattern element sequence 390 generated by the pattern element sequence generation unit 373 in a predetermined pattern 391p, and displays it on the screen. The CPU 351a , RAM 351b, user I / F 351d, etc. are functional blocks realized by cooperating with software. The one-time password input unit 356 has the same configuration as the corresponding component of the offline user authentication system 200. The verification data storage unit 361 is a component that stores verification data 394 including a plurality of pattern seed values 383 and a plurality of verification codes 393 for a certain user in association with the user ID 302a of the user. The RAM 301b, the storage device 301c, and the like are functional blocks realized by cooperating with software. The verification data 394 stored in the verification data storage unit 361 is acquired from the pattern seed value receiving unit 371 and the verification code receiving unit 362, and the user ID used when acquiring them is associated and stored as the user ID 302a. Is done. The verification data storage unit 361 can store verification data 394 of a plurality of users. The verification code receiving unit 362 has the same configuration as the corresponding component of the offline user authentication system 200. The verification code specifying unit 364 is a component that specifies the verification code 393 corresponding to the pattern seed value 383 selected by the pattern seed value selecting unit 372. The CPU 351a, the RAM 351b, the storage device 351c, and the like cooperate with the software. Is a functional block realized by The user authentication unit 365 has the same configuration as the corresponding component of the offline user authentication system 200. The pattern seed value receiving unit 371 is a component that acquires a plurality of pattern seed values 383 constituting the verification data 394 generated by the offline authentication support server 301. The CPU 351a, the RAM 351b, the user I / F 351d, or the external / network I / F351e is a functional block realized by cooperating with software. The plurality of pattern seed values 383 may be acquired from the offline authentication support server 301 through a network, or may be acquired from a storage medium that stores them. The pattern seed value selection unit 372 checks whether or not a user ID equal to the input user ID 381 is stored in the user ID 302a. If there is a user ID equal to the input user ID 381, the verification associated with the user ID A component that selects a pattern seed value 383 that generates a presentation pattern 391 together with an input user ID 381 by selecting one of a plurality of pattern seed values 383 included in the data 394 according to a predetermined rule. The CPU 351a, The RAM 351b, the storage device 351c, and the like are functional blocks realized by cooperating with software. The pattern element sequence generation unit 373 is a component that generates a pattern element included in the presentation pattern 391 based on a predetermined generation rule based on the pattern seed value 383 selected by the pattern seed value selection unit 372 and the input user ID 381. The CPU 351a, the RAM 351b, and the like are functional blocks realized by cooperating with software.

  In the present embodiment, the offline user authentication system 300 specifically has the same configuration as the offline user authentication system 200.

[Operation of Offline User Authentication System 300]
The operation of the offline user authentication system 300 will now be described. The operation of the offline user authentication system 300 can be roughly divided into two stages. In one stage, the offline user authentication system 300 generates verification data 394 for a user who will receive user authentication, and obtains and stores the verification data 394 in advance. The other stage is a stage in which the offline authentication client 351 performs user authentication based on verification data 394 stored in advance for a user who wants to receive user authentication.

[Operation (1) of Offline User Authentication System 300-Acquisition of Verification Data]
First, an operation flow for acquiring the verification data 394 will be described. FIG. 7 is an operation flowchart of verification data acquisition of the offline user authentication system 300. First, a user who is to be authenticated by the offline user authentication system 300 inputs and registers the user ID 302a and the one-time password derivation rule 302b, which is a password, in the offline authentication support server 301 in advance. The password storage unit 302 stores the user ID 302a of the user and the one-time password derivation rule 302b in advance in association with each other prior to user authentication (step S301).

  Next, the user who wants to receive authentication inputs his or her user ID as the input user ID 381 through the user ID input unit 352 in the offline authentication client 351 using the user ID input unit 352 (step S303). Next, the offline authentication client 351 transmits a request for generation and output of verification data 394 including the input user ID 381 to the offline authentication support server 301 by the verification data requesting unit 353 (step S305). Next, the offline authentication support server 301 receives the verification data request including the input user ID 381 transmitted from the offline authentication client 351 by the request receiving unit 303 (step S307). Next, the offline authentication support server 301 causes the pattern seed value generation unit 321 to generate a plurality of pattern seed values 383 according to a predetermined generation rule (step S309). The predetermined generation rule is typically to generate a random number within a predetermined range. FIG. 10 illustrates the pattern seed value 383 such as “284E17... 39D0” expressed in hexadecimal. The pattern seed value 383 can be represented by a numeric string having a predetermined bit length such as 8 bytes, and in this case, the predetermined range is a range from “0000000000000” to “FFFFFFFFFFFFFFFF” in hexadecimal. . Therefore, for the same input user ID 302a, any number string within the predetermined range can be used as the pattern seed value 383, and therefore, the presentation patterns 391 that are different by the number of the predetermined range at the maximum are generated. Is possible.

  Next, the off-line authentication support server 301 uses the verification code generation means 306 from the pattern element sequence 390 generated by a predetermined pattern element sequence generation rule based on the input user ID 381 and the generated pattern seed value 383. In correspondence with each of the configured presentation patterns 391, a one-way function calculation was performed on the result of applying the one-time password derivation rule 302b associated with the input user ID 381 to the pattern elements included in the respective presentation patterns 391. A plurality of verification codes 393 are generated. (Step S311). Next, the offline authentication support server 301 transmits the generated plurality of pattern seed values 383 to the offline authentication client 351 by the pattern seed value transmission unit 322 (step S313). Next, the offline authentication client 351 receives a plurality of pattern seed values 383 transmitted from the offline authentication support server 301 by the pattern seed value receiving unit 371 and stores them in the verification data storage unit 361 together with the input user ID 381. (Step S315). Next, the offline authentication support server 301 transmits the generated plurality of verification codes 393 to the offline authentication client 351 by the verification code transmitting unit 311 (step S317). Next, the offline authentication client 351 receives a plurality of verification codes 393 transmitted from the offline authentication support server 301 by the verification code receiving unit 362, and stores them in the verification data storage unit 361 (step S319). Through the above operation, the verification data 394 corresponding to the input user ID 381 is stored in the offline authentication client 351, and preparation for offline user authentication is completed.

  The verification data request can be directly input to the offline authentication support server 301. In this case, a verification data request including the input user ID 381 is input to the offline authentication support server 301, and the corresponding verification data 394 is output to a storage medium or the like. The offline authentication client 351 reads the verification data 394 from the storage medium and stores it.

[Operation (2) of Offline User Authentication System 300-User Authentication]
Next, an operation flow of offline user authentication will be described. FIG. 8 is an operation flow diagram of offline user authentication of the offline user authentication system 300. First, the user who wants to receive authentication inputs the user ID to the offline authentication client 351 through the user ID input means 352 (step S351). Next, the offline authentication client 351 uses the pattern seed value selection unit 372 to confirm that the input user ID 381 is included in the user ID 302a stored in the verification data storage unit 361 (step S353). Next, the offline authentication client 351 uses the pattern seed value selection unit 372 to select one pattern seed value 383 from a plurality of pattern seed values 383 associated with the input user ID 381 according to a predetermined rule (step S355). ). Next, the offline authentication client 351 uses the verification code specifying unit 362 to specify the verification code corresponding to the pattern seed value 383 selected in step S355 from among the plurality of verification codes 393 associated with the input user ID 381. (Step S357). Next, the offline authentication client 351 uses the pattern element string generation unit 373 to generate a predetermined pattern element string generation rule based on the input user ID 381 input in step S351 and the pattern seed value 383 selected in step S355. Thus, a pattern element sequence 390 constituting the presentation pattern 391 is generated (step S359). The predetermined pattern element string generation rule is a pattern element string uniquely determined for the combination of the input user ID 381 and the pattern seed value 383, and the original input user ID 381 and the pattern are determined from only the pattern element string. A rule that generates an extremely difficult seed value 383 to be estimated. Typically, a combination of an input user ID 381 and a pattern seed value 383 as described below is used as a kind of initial value. This is due to encryption operations. FIG. 11 is a conceptual diagram of a method for generating the presentation pattern 391. Here, the pattern element sequence 390 is generated based on the input user ID 381 “User” and the pattern seed value 383 “284E17... 39D0”. For this purpose, first, a predetermined numeric string is uniquely generated from the combination of the input user ID 381 and the pattern seed value 383. In the example shown in the first stage and the second stage of FIG. 11, the input user ID 381 and the pattern seed value 383 expressed in hexadecimal numbers are combined to generate a predetermined numeric string. As other methods for combining the input user ID 381 and the pattern seed value 383, other combinations such as addition, subtraction, and exclusive OR can be used. Next, an encryption operation is performed on the predetermined numeric string to generate a bit string 384 having a predetermined bit length. Here, the predetermined bit length is 256 bits, which is an amount of information sufficient to generate a presentation pattern 391 composed of 64 numbers. As the encryption operation, it is only necessary that it is practically impossible to obtain the original numeric string from the operation result, and a hash function operation, a common key encryption operation, and the like can be used. For example, when SHA256 is used as a hash function and the predetermined numeric string is encrypted, a 256-bit bit string 384 can be generated. In addition, when AES is used as a common key encryption operation, a key is generated from the predetermined numeric string, and when a 256-bit numeric string appropriately set in advance is encrypted with the key, a 256-bit bit string 384 is generated. can do. Further, the hash function operation and the common key encryption operation can be combined. Note that the value of the bit string 384 “0111001011001101... 11010” illustrated in FIG. 11 is an example for explanation, and does not indicate an accurate result of the SHA256 calculation. Next, the 256-bit bit string 384 is converted into a 77-digit decimal number, and a 64-digit number is extracted therefrom to form a pattern element string 390. Note that the value of the pattern element sequence 390 “38064655... 1017” shown in FIG. 11 is an example for explanation, and does not indicate an accurate conversion / extraction result. Extraction of 64-digit numbers can use any operation such as deletion of unnecessary upper bit strings, deletion of unnecessary lower bit strings, and division. Next, the offline authentication client 351 uses the pattern display unit 363 to arrange each pattern element of the generated pattern element sequence 390 at the position of each element of a pattern composed of four 4 × 4 matrices. Is generated and displayed on the screen of the offline authentication client 351 (step S361).

  Next, the offline authentication client 351 receives the input of the one-time password 392 by the one-time password input unit 356 (step S363). Next, the offline authentication client 351 uses the verification code 393 identified by the user authentication means 365 to have performed the same one-way function operation as that used when generating the verification code 393 on the input one-time password 392. If they are equal, the user authentication of the user is successful (step S363).

  In the operation flow described above, the operation flow can be changed freely as long as there is no inconsistency in the operation flow, such as using data that should not be used in that step. can do.

  Each embodiment described above is an example for explaining the present invention, and the present invention is not limited to these embodiments. The present invention can be implemented in various forms without departing from the gist thereof.

It is a hardware block diagram of the offline user authentication system 200 which concerns on one Embodiment of this invention. It is a hardware block diagram of the offline user authentication system 300 which concerns on one Embodiment of this invention. 1 is a block diagram of an offline user authentication system 200 according to an embodiment of the present invention. 1 is a block diagram of an offline user authentication system 300 according to an embodiment of the present invention. It is an operation | movement flowchart of the verification data acquisition of the offline user authentication system 200 which concerns on one Embodiment of this invention. It is an operation | movement flowchart of the offline user authentication of the offline user authentication system 200 which concerns on one Embodiment of this invention. It is an operation | movement flowchart of the verification data acquisition of the offline user authentication system 300 which concerns on one Embodiment of this invention. It is an operation | movement flowchart of the offline user authentication of the offline user authentication system 300 which concerns on one Embodiment of this invention. It is a conceptual diagram of the production | generation method of the presentation pattern in the offline user authentication system 200 which concerns on one Embodiment of this invention. It is a conceptual diagram of the presentation pattern production | generation method in the offline user authentication system 300 which concerns on one Embodiment of this invention. FIG. 10 is a conceptual diagram of a presentation pattern generation method in the offline user authentication system 200 according to an embodiment of the present invention, which is a continuation of FIG. 10. It is a conceptual diagram of the one-time password derivation rule in a matrix authentication system. It is a conceptual diagram of the one-time password input method in a matrix authentication system. It is an image figure of the Windows logon authentication screen in the offline user authentication systems 200 and 300. 1 is a block diagram of a conventional matrix authentication type online user authentication system 100. FIG. It is a conceptual diagram of the presentation pattern generation method in the online user authentication system 100 of the conventional matrix authentication system.

Explanation of symbols

100 Online User Authentication System 101 Online Authentication Server 102 Password Storage Unit 102a User ID
102b One-time password derivation rule 103 User ID reception means 104 Pattern generation means 105 Pattern transmission means 106 Verification code generation means 107 One-time password reception means 108 User authentication means 151 Authentication request client 152 User ID input means 153 User ID transmission means 154 Pattern Reception means 155 Pattern display means 156 One-time password input means 157 One-time password transmission means 181 Input user ID
190 pattern element sequence 191 presentation pattern 191p predetermined pattern 192 one-time password 193 verification code 196 keyboard 200 offline user authentication system 201 offline authentication support server 201a CPU
201b RAM
201c storage device 201c1 OS
201c2 User authentication support application 201d User interface (I / F)
201e External / network interface (I / F)
202 Password storage unit 202a User ID
202b One-time password derivation rule 203 Request accepting means 204 Pattern generating means 205 Pattern transmitting means 206 Verification code generating means 211 Verification code transmitting means 251 Offline authentication client 251a CPU
251b RAM
251c storage device 251c1 OS
251c2 Verification data request module 251c3 Presentation pattern selection / generation module 251c4 Verification code identification / authentication module 251d User interface (I / F)
251e External / Network interface (I / F)
252 User ID input means 253 Verification data request means 254 Pattern reception means 255 Pattern display means 256 One-time password input means 262 Verification code reception means 263 Pattern selection means 264 Verification code identification means 265 User authentication means 281 Input user ID
284 Bit string 290 Pattern element string 291 Presentation pattern 291p Predetermined pattern 292 One-time password 293 Verification code 294 Verification data 296 Keyboard 297A Logon authentication screen 297B Logon authentication screen 300 Offline user authentication system 301 Offline authentication support server 301a CPU
301b RAM
301c storage device 301c1 OS
301c2 User authentication support application 301d User interface (I / F)
301e External / Network interface (I / F)
302 Password storage unit 302a User ID
302b One-time password derivation rule 303 Request reception means 304 Pattern generation means 305 Pattern transmission means 306 Verification code generation means 311 Verification code transmission means 351 Offline authentication client 351a CPU
351b RAM
351c storage device 351c1 OS
351c2 Verification data request module 351c3 Seed value selection / pattern generation module 351c4 Verification code identification / authentication module 351d User interface (I / F)
351e External / network interface (I / F)
352 User ID input means 353 Verification data request means 355 Pattern display means 356 One-time password input means 362 Verification code reception means 364 Verification code identification means 365 User authentication means 371 Pattern seed value reception means 372 Pattern seed value selection means 373 Pattern element sequence Generation means 381 Input user ID
383 Pattern seed value 384 Bit string 390 Pattern element string 391 Presentation pattern 391p Predetermined pattern 392 One-time password 393 Verification code 394 Verification data 396 Keyboard 397A Logon authentication screen 397B Logon authentication screen

Claims (24)

  1. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern An offline user authentication system that uses a password derivation rule as an offline password of the user,
    An offline authentication support server for managing the user ID and password of the user;
    An offline authentication client that is a terminal that can be connected to the offline authentication support server via a network but is in a network disconnected state, and is a terminal that authenticates the user offline,
    The offline authentication client is
    User ID input means for receiving input of the user ID from the user;
    User ID transmission means for transmitting the input user ID to the offline authentication support server through the network;
    Have
    The offline authentication support server includes:
    A password storage unit that stores the user ID of the user and the one-time password derivation rule of the user in advance in association with each other;
    Pattern generation means for generating a plurality of pattern element sequences, which are a set of pattern elements constituting the presentation pattern, according to a predetermined generation rule;
    User ID receiving means for receiving a user ID of a user who is going to be authenticated from the offline authentication client through the network;
    The one-time password derivation rule associated with the received user ID is associated with each of the presentation patterns configured by each of the plurality of pattern element sequences generated by the pattern generation means. Verification code generation means for generating a plurality of verification codes that are obtained by performing one-way function operations on the results applied to pattern elements included in the presented pattern;
    A pattern transmitting means for transmitting the generated plurality of pattern element sequences to the offline authentication client of the user to be authenticated through the network;
    A verification code transmitting means for transmitting the plurality of generated verification codes to the offline authentication client of the user to be authenticated through the network;
    Have
    The offline authentication client is
    Pattern receiving means for receiving the plurality of pattern element sequences transmitted from the offline authentication support server through the network;
    A pattern storage unit for storing the plurality of received pattern element sequences;
    Verification code receiving means for receiving a plurality of the verification codes transmitted from the offline authentication support server through the network;
    A verification code storage unit that stores the plurality of verification codes received;
    Pattern selecting means for selecting one pattern element string from among the plurality of pattern element strings stored in the pattern storage unit for use in authentication of the user;
    Verification code specifying means for specifying a verification code corresponding to the selected pattern element sequence;
    Pattern display means for generating a presentation pattern by arranging each pattern element included in the selected pattern element sequence in the predetermined pattern, and displaying it on a screen;
    One-time password input means for receiving an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern from the user;
    User authentication means for comparing the verification code identified with the one-way function operation performed on the input one-time password and succeeding in the offline authentication of the user when they are equal;
    An offline user authentication system, further comprising:
  2. The offline user authentication system according to claim 1,
    The pattern selection means is connected to the off-line authentication support server and until the pattern element sequence and the verification code are newly received and stored, of the plurality of stored pattern element sequences. An offline user authentication system that is configured not to select those already selected for use in authentication.
  3. In the offline user authentication system according to claim 1 or 2,
    An offline user authentication system in which the pattern element sequence and the verification code are encrypted when stored in the offline authentication client.
  4. In the offline user authentication system according to any one of claims 1 to 3,
    The offline authentication support server is an offline user that is operated immediately after user authentication using the user ID to the network between the offline authentication client and the offline authentication support server succeeds and comes online. Authentication system.
  5. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern An offline user authentication system that uses a password derivation rule as an offline password of the user,
    An offline authentication support server for managing the user ID and password of the user;
    An offline authentication client that is a terminal that can be connected to the offline authentication support server via a network but is in a network disconnected state, and is a terminal that authenticates the user offline,
    The offline authentication client is
    User ID input means for receiving input of the user ID from the user;
    User ID transmission means for transmitting the input user ID to the offline authentication support server through the network;
    Have
    The offline authentication support server includes:
    A password storage unit that stores the user ID of the user and the one-time password derivation rule of the user in advance in association with each other;
    Pattern seed value generating means for generating a plurality of pattern seed values that are combined with the user ID to uniquely determine the presentation pattern according to a predetermined generation rule;
    User ID receiving means for receiving a user ID of a user who is going to be authenticated from the offline authentication client through the network;
    Based on the received user ID and each generated pattern seed value, the user ID is associated with each of the presentation patterns composed of pattern element sequences generated by a predetermined pattern element sequence generation rule. Verification code generation means for generating a plurality of verification codes that are obtained by performing a one-way function operation on the result of applying the associated one-time password derivation rule to the pattern elements included in the respective presentation patterns;
    A pattern seed value transmitting means for transmitting the generated plurality of pattern seed values to the offline authentication client of the user to be authenticated through the network;
    A verification code transmitting means for transmitting the plurality of generated verification codes to the offline authentication client of the user to be authenticated through the network;
    Have
    The offline authentication client is
    Pattern seed value receiving means for receiving the plurality of pattern seed values transmitted from the offline authentication support server through the network;
    A pattern seed value storage unit for storing a plurality of received pattern seed values;
    Verification code receiving means for receiving a plurality of the verification codes transmitted from the offline authentication support server through the network;
    A verification code storage unit that stores the plurality of verification codes received;
    Pattern seed value selection means for selecting one of the plurality of pattern seed values stored in the pattern seed value storage unit for use in authentication of the user;
    Verification code specifying means for specifying a verification code corresponding to the selected pattern seed value;
    Pattern element sequence generation means for generating a pattern element sequence based on the predetermined pattern element sequence generation rule based on the input user ID and the selected pattern seed value;
    Pattern display means for generating a presentation pattern by arranging each pattern element included in the generated pattern element sequence in the predetermined pattern, and displaying it on a screen;
    One-time password input means for receiving an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern from the user;
    User authentication means for comparing the verification code identified with the one-way function operation performed on the input one-time password and succeeding in the offline authentication of the user when they are equal;
    An offline user authentication system, further comprising:
  6. The offline user authentication system according to claim 5,
    The pattern seed value selection means is connected to the offline authentication support server and then receives and stores the pattern seed value and the verification code newly, among the plurality of stored pattern seed values. An offline user authentication system that is configured not to select those already selected for use in authenticating users.
  7. In the offline user authentication system according to claim 5 or 6,
    An offline user authentication system in which the pattern seed value and the verification code are encrypted when stored in the offline authentication client.
  8. In the offline user authentication system according to any one of claims 5 to 7,
    The offline authentication support server is an offline user that is operated immediately after user authentication using the user ID to the network between the offline authentication client and the offline authentication support server succeeds and comes online. Authentication system.
  9. The offline user authentication system according to claim 5,
    The pattern element string generation rule of the pattern element string generation means is a result of applying a common key encryption algorithm operation to a predetermined initial character character string using a value based on the user ID and the pattern seed value as a key. An offline user authentication system for generating the pattern element sequence based on the above.
  10. The offline user authentication system according to claim 5,
    The pattern element sequence generation rule of the pattern element sequence generation means generates the pattern element sequence based on a result of applying a hash function operation to a value based on the user ID and the pattern seed value. system.
  11. In the offline user authentication system according to any one of claims 1 to 10,
    The offline user authentication system, wherein the one-time password derivation rule is a combination of each position of a pattern element included in the presentation pattern and an order in which the position of each pattern element is selected.
  12. The offline user authentication system according to claim 11,
    The one-time password derivation rules include the respective positions of selected pattern elements included in the presentation pattern and the characters input without being based on the presentation patterns, the positions of the respective pattern elements, and the respective An offline user authentication system that is a combination of the order in which characters are selected or entered.
  13. The offline user authentication system according to claim 11 or 12,
    An offline user authentication system in which each pattern element included in the presentation pattern is selected from numbers and symbols from 0 to 9.
  14. The offline user authentication system according to claim 13,
    An offline user authentication system in which each pattern element included in the presentation pattern is selected from numbers from 0 to 9.
  15. The offline user authentication system according to claim 14,
    The predetermined pattern in which a plurality of pattern elements included in the presentation pattern is arranged includes an off-line user including a matrix in which the pattern elements are arranged so as to form a square as a whole at each of m vertical x horizontal n positions. Authentication system.
  16. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern The password derivation rule is set to the offline password of the user, the offline authentication support server that manages the user ID and password of the user, and the offline authentication support server that can be connected to the offline authentication support server in a network disconnected state An offline user authentication method for authenticating the user offline,
    The offline authentication support server storing the user ID of the user and the one-time password derivation rule of the user in advance in association with each other;
    The offline authentication client receiving an input of a user ID of a user who is going to be authenticated;
    The offline authentication client transmitting the input user ID to the offline authentication support server through the network;
    The offline authentication support server receiving a user ID of a user to be authenticated from the offline authentication client through the network;
    The offline authentication support server generating a plurality of pattern element sequences, which are a set of pattern elements constituting the presentation pattern, according to a predetermined generation rule;
    The offline authentication support server sets the one-time password derivation rule associated with the received user ID in association with each of the presented patterns configured by each of the generated plurality of pattern element sequences. Generating a plurality of verification codes that are one-way function operations on the results applied to the pattern elements included in each presentation pattern;
    The offline authentication support server transmitting the generated plurality of pattern element sequences to the offline authentication client of the user to be authenticated through the network;
    The offline authentication support server transmitting the generated plurality of verification codes to the offline authentication client of the user to be authenticated through the network;
    The offline authentication client receiving a plurality of the pattern element sequences transmitted from the offline authentication support server through the network;
    The offline authentication client storing a plurality of received pattern element sequences;
    The offline authentication client receiving a plurality of the verification codes transmitted from the offline authentication support server through the network;
    The offline authentication client storing a plurality of received verification codes;
    The offline authentication client selecting one of the stored pattern element sequences for use in authenticating the user;
    The offline authentication client specifying a verification code corresponding to the selected pattern element sequence;
    The offline authentication client generates a presentation pattern by arranging each pattern element included in the selected pattern element string in the predetermined pattern, and displays it on a screen;
    The offline authentication client receiving from the user an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern;
    The off-line authentication client compares the verification code identified with the one-way function performed on the inputted one-time password, and if they are equal, the off-line authentication client succeeds in the off-line authentication of the user. When,
    An off-line user authentication method comprising:
  17. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern The password derivation rule is set to the offline password of the user, the offline authentication support server that manages the user ID and password of the user, and the offline authentication support server that can be connected to the offline authentication support server in a network disconnected state An offline user authentication method for authenticating the user offline,
    The offline authentication support server storing the user ID of the user and the one-time password derivation rule of the user in advance in association with each other;
    The offline authentication client receiving an input of a user ID of a user who is going to be authenticated;
    The offline authentication client transmitting the input user ID to the offline authentication support server through the network;
    The offline authentication support server generating a plurality of pattern seed values according to a predetermined generation rule, which is a value that uniquely determines the presentation pattern in combination with the user ID;
    The offline authentication support server receiving a user ID of a user to be authenticated from the offline authentication client through the network;
    The offline authentication support server corresponds to each of the presentation patterns configured by the pattern element sequence generated by a predetermined pattern element sequence generation rule based on the received user ID and each generated pattern seed value. And generating a plurality of verification codes obtained by performing the one-way function operation on the result of applying the one-time password derivation rule associated with the user ID to the pattern elements included in the respective presentation patterns. When,
    The offline authentication support server transmitting the generated plurality of pattern seed values to the offline authentication client of the user to be authenticated through the network;
    The offline authentication support server transmitting the generated plurality of verification codes to the offline authentication client of the user to be authenticated through the network;
    The offline authentication client receiving a plurality of the pattern seed values transmitted from the offline authentication support server through the network;
    The offline authentication client storing a plurality of received pattern seed values;
    The offline authentication client receiving a plurality of the verification codes transmitted from the offline authentication support server through the network;
    The offline authentication client storing a plurality of received verification codes;
    The offline authentication client selecting one of the plurality of stored pattern seed values for use in authenticating the user;
    The offline authentication client identifying a verification code corresponding to the selected pattern seed value;
    The offline authentication client generating a pattern element sequence according to the predetermined pattern element sequence generation rule based on the input user ID and the selected pattern seed value;
    The offline authentication client generates a presentation pattern by arranging each pattern element included in the generated pattern element sequence in the predetermined pattern, and displays it on a screen;
    The offline authentication client receiving from the user an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern;
    The off-line authentication client compares the verification code identified with the one-way function performed on the inputted one-time password, and if they are equal, the off-line authentication client succeeds in the off-line authentication of the user. When,
    An off-line user authentication method comprising:
  18. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline authentication client that is a terminal that performs offline user authentication,
    Pattern input means for receiving in advance a pattern element string that is a set of pattern elements constituting the presentation pattern generated in advance by a predetermined generation rule;
    A pattern storage unit that stores a plurality of input pattern element sequences in advance;
    The one-time password, which is a password associated with a user who is going to be authenticated, generated in advance in correspondence with each of the presentation patterns configured by each of the plurality of pattern element sequences input in advance Verification code input means for receiving in advance a verification code that is a result of applying a one-way function operation to a result of applying a derivation rule to a pattern element included in each of the presentation patterns;
    A verification code storage unit that stores in advance a plurality of the verification codes that are input;
    User ID input means for receiving input of the user ID from a user who is going to receive authentication;
    Pattern selecting means for selecting one pattern element string from among the plurality of pattern element strings stored in advance by the pattern storage unit for use in authentication of the user;
    Verification code specifying means for specifying a verification code corresponding to the selected pattern element sequence;
    Pattern display means for generating a presentation pattern by arranging each pattern element included in the selected pattern element sequence in the predetermined pattern, and displaying it on a screen;
    One-time password input means for receiving an input of a one-time password, which is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern, from the user who wants to receive authentication;
    User authentication means for comparing the verification code identified with the one-way function operation performed on the input one-time password and succeeding in the offline authentication of the user when they are equal;
    An offline authentication client characterized by comprising:
  19. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline authentication client that is a terminal that performs offline user authentication,
    A pattern seed value input means for receiving in advance a pattern seed value that is generated in advance by a predetermined generation rule and is a value that uniquely determines the presentation pattern in combination with the user ID;
    A pattern seed value storage unit that stores a plurality of input pattern seed values in advance;
    Each of the presentation patterns composed of a pattern element sequence generated by a predetermined pattern element sequence generation rule based on the user ID of the user who is going to be authenticated and the pattern seed value generated in advance. A one-way function calculation is applied to the result of applying the one-time password derivation rule, which is a password associated with the user who is going to receive the authentication, generated in advance in correspondence to the pattern elements included in the respective presentation patterns. Verification code input means for receiving in advance the input of the verification code that is implemented,
    A verification code storage unit that stores in advance a plurality of the verification codes that are input;
    User ID input means for receiving input of the user ID from a user who is going to receive authentication;
    A pattern seed value selection means for selecting one pattern seed value of the plurality of pattern seed values stored in advance by the pattern seed value storage unit for use in authentication of the user;
    Verification code specifying means for specifying a verification code corresponding to the selected pattern seed value;
    Pattern element sequence generation means for generating a pattern element sequence based on the predetermined pattern element sequence generation rule based on the input user ID and the selected pattern seed value;
    Pattern display means for generating a presentation pattern by arranging each pattern element included in the generated pattern element sequence in the predetermined pattern, and displaying it on a screen;
    One-time password input means for receiving an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern from the user;
    User authentication means for comparing the verification code identified with the one-way function operation performed on the input one-time password and succeeding in the offline authentication of the user when they are equal;
    An offline authentication client characterized by comprising:
  20. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline user authentication method for performing authentication with an offline authentication client, which is a terminal for authenticating the user offline,
    A step of receiving in advance an input of a pattern element sequence that is a set of pattern elements constituting the presentation pattern generated in advance by a predetermined generation rule;
    Storing in advance a plurality of input pattern element sequences;
    The one-time password, which is a password associated with a user who is going to be authenticated, generated in advance in correspondence with each of the presentation patterns configured by each of the plurality of pattern element sequences input in advance A step of receiving in advance an input of a verification code that is obtained by performing a one-way function operation on a result of applying a derivation rule to a pattern element included in each of the presentation patterns;
    Preliminarily storing a plurality of input verification codes;
    Receiving an input of the user ID from a user who intends to receive authentication;
    Selecting one of a plurality of pre-stored pattern element sequences for use in authenticating the user;
    Identifying a verification code corresponding to the selected pattern element sequence;
    Arranging each pattern element included in the selected pattern element sequence in the predetermined pattern to generate a presentation pattern and displaying it on the screen;
    Accepting an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern from the user who wants to receive authentication;
    Comparing the verification code identified with the one-way function operation performed on the input one-time password, and successful authentication of the user offline if they are equal;
    An off-line user authentication method comprising:
  21. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline user authentication method for performing authentication with an offline authentication client, which is a terminal for authenticating the user offline,
    A step of receiving in advance a pattern seed value, which is generated in advance by a predetermined generation rule and combined with the user ID to uniquely determine the presentation pattern;
    Preliminarily storing a plurality of input pattern seed values;
    Each of the presentation patterns composed of a pattern element sequence generated by a predetermined pattern element sequence generation rule based on the user ID of the user who is going to be authenticated and the pattern seed value generated in advance. A one-way function operation is performed on the result of applying the one-time password derivation rule, which is a password associated with the user who is going to receive the authentication, generated in advance in correspondence to the pattern elements included in the respective presentation patterns. A step of receiving in advance an input of a verification code that is implemented,
    Preliminarily storing a plurality of input verification codes;
    Receiving an input of the user ID from a user who intends to receive authentication;
    Selecting one of the plurality of pre-stored pattern seed values for use in authenticating the user;
    Identifying a verification code corresponding to the selected pattern seed value;
    Generating a pattern element sequence according to the predetermined pattern element sequence generation rule based on the input user ID and the selected pattern seed value;
    Arranging each pattern element included in the generated pattern element sequence in the predetermined pattern to generate a presentation pattern and displaying it on the screen;
    Receiving from the user an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern;
    Comparing the verification code identified with the one-way function operation performed on the input one-time password, and successful authentication of the user offline if they are equal;
    An off-line user authentication method comprising:
  22. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline user authentication program that causes an offline computer to execute an offline user authentication method,
    The offline user authentication method includes:
    A step of receiving in advance an input of a pattern element sequence that is a set of pattern elements constituting the presentation pattern generated in advance by a predetermined generation rule;
    Storing in advance a plurality of input pattern element sequences;
    The one-time password, which is a password associated with a user who is going to be authenticated, generated in advance in correspondence with each of the presentation patterns configured by each of the plurality of pattern element sequences input in advance A step of receiving in advance an input of a verification code that is obtained by performing a one-way function operation on a result of applying a derivation rule to a pattern element included in each of the presentation patterns;
    Preliminarily storing a plurality of input verification codes;
    Receiving an input of the user ID from a user who intends to receive authentication;
    Selecting one of a plurality of pre-stored pattern element sequences for use in authenticating the user;
    Identifying a verification code corresponding to the selected pattern element sequence;
    Arranging each pattern element included in the selected pattern element sequence in the predetermined pattern to generate a presentation pattern and displaying it on the screen;
    Accepting an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern from the user who wants to receive authentication;
    Comparing the verification code identified with the one-way function operation performed on the input one-time password, and successful authentication of the user offline if they are equal;
    An offline user authentication program characterized by comprising:
  23. One-time to generate a one-time password by presenting a plurality of pattern elements arranged in a predetermined pattern as a presentation pattern to a user who is authenticated and applying it to a pattern element at a specific position included in the presentation pattern In the offline user authentication system in which the password derivation rule is the offline password of the user, an offline user authentication program that causes an offline computer to execute an offline user authentication method,
    The offline user authentication method includes:
    A step of receiving in advance a pattern seed value, which is generated in advance by a predetermined generation rule and combined with the user ID to uniquely determine the presentation pattern;
    Preliminarily storing a plurality of input pattern seed values;
    Each of the presentation patterns composed of a pattern element sequence generated by a predetermined pattern element sequence generation rule based on the user ID of the user who is going to be authenticated and the pattern seed value generated in advance. A one-way function operation is performed on the result of applying the one-time password derivation rule, which is a password associated with the user who is going to receive the authentication, generated in advance in correspondence to the pattern elements included in the respective presentation patterns. A step of receiving in advance an input of a verification code that is implemented,
    Preliminarily storing a plurality of input verification codes;
    Receiving an input of the user ID from a user who intends to receive authentication;
    Selecting one of the plurality of pre-stored pattern seed values for use in authenticating the user;
    Identifying a verification code corresponding to the selected pattern seed value;
    Generating a pattern element sequence according to the predetermined pattern element sequence generation rule based on the input user ID and the selected pattern seed value;
    Arranging each pattern element included in the generated pattern element sequence in the predetermined pattern to generate a presentation pattern and displaying it on the screen;
    Receiving from the user an input of a one-time password that is a result of applying the one-time password derivation rule to a pattern element included in the presentation pattern;
    Comparing the verification code identified with the one-way function operation performed on the input one-time password, and successful authentication of the user offline if they are equal;
    An offline user authentication program characterized by comprising:
  24. The offline user authentication program according to claim 22 or 23,
    The program is an offline user authentication program which is a form of a Windows authentication program that is called by setting a registry when the Windows OS is started.
JP2006094782A 2006-03-30 2006-03-30 Offline user authentication system, method thereof, and program thereof Active JP3996939B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2006094782A JP3996939B2 (en) 2006-03-30 2006-03-30 Offline user authentication system, method thereof, and program thereof

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2006094782A JP3996939B2 (en) 2006-03-30 2006-03-30 Offline user authentication system, method thereof, and program thereof
US11/450,536 US7945948B2 (en) 2006-03-30 2006-06-09 System, method and program for off-line user authentication
US12/580,644 US7984491B2 (en) 2006-03-30 2009-10-16 System, method and program for off-line user authentication

Publications (2)

Publication Number Publication Date
JP2007272364A true JP2007272364A (en) 2007-10-18
JP3996939B2 JP3996939B2 (en) 2007-10-24

Family

ID=38560883

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2006094782A Active JP3996939B2 (en) 2006-03-30 2006-03-30 Offline user authentication system, method thereof, and program thereof

Country Status (2)

Country Link
US (2) US7945948B2 (en)
JP (1) JP3996939B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009213139A (en) * 2008-03-05 2009-09-17 Samsung Electronics Co Ltd Password system
JP4654329B1 (en) * 2010-02-15 2011-03-16 株式会社シー・エス・イー Content presentation type authentication system
JP4713693B1 (en) * 2010-10-05 2011-06-29 株式会社シー・エス・イー Offline two-factor user authentication system, method and program
JP2012079284A (en) * 2011-02-21 2012-04-19 Cse:Kk Offline two-factor user authentication system, method therefor, and program therefor
WO2013185326A1 (en) * 2012-06-14 2013-12-19 Google Inc. Verifying user identity
JP2014511047A (en) * 2011-02-07 2014-05-01 ボール,デイヴィッド Smart card with verification means
JP2014512589A (en) * 2011-03-03 2014-05-22 マイクロソフト コーポレーション Sharing user IDs between operating systems and applications
US8752147B2 (en) 2010-10-05 2014-06-10 Cse Co., Ltd System and method for two-factor user authentication

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9191215B2 (en) * 2003-12-30 2015-11-17 Entrust, Inc. Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US20080034216A1 (en) * 2006-08-03 2008-02-07 Eric Chun Wah Law Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
US20080112562A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Methods for linking content with license
US20080114693A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Method for allowing content protected by a first DRM system to be accessed by a second DRM system
US20080114772A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Method for connecting to a network location associated with content
US8079071B2 (en) * 2006-11-14 2011-12-13 SanDisk Technologies, Inc. Methods for accessing content based on a session ticket
US8763110B2 (en) * 2006-11-14 2014-06-24 Sandisk Technologies Inc. Apparatuses for binding content to a separate memory device
US8046389B2 (en) * 2006-12-22 2011-10-25 Sap Ag Automatic data determination
ES2354932T3 (en) * 2007-05-30 2011-03-21 Pamci Networks Denmark Aps Secure registration protocol.
JP5184627B2 (en) 2007-06-26 2013-04-17 G3−ビジョン リミテッドG3−vision Limited Communication device, authentication system and method, and carrier medium
SG183697A1 (en) * 2007-08-06 2012-09-27 Monseignat Bernard De System and method for authentication, data transfer, and protection against phishing
US8291495B1 (en) 2007-08-08 2012-10-16 Juniper Networks, Inc. Identifying applications for intrusion detection systems
US8112800B1 (en) 2007-11-08 2012-02-07 Juniper Networks, Inc. Multi-layered application classification and decoding
US8424057B2 (en) * 2007-12-28 2013-04-16 Ebay, Inc. Mobile anti-phishing
US8321929B2 (en) * 2008-03-24 2012-11-27 Dell Products L.P. System and method for implementing a one time password at an information handling system
US8572717B2 (en) 2008-10-09 2013-10-29 Juniper Networks, Inc. Dynamic access control policy with port restrictions for a network security appliance
US8949955B2 (en) * 2008-10-29 2015-02-03 Symantec Corporation Method and apparatus for mobile time-based UI for VIP
JP5276658B2 (en) * 2009-01-09 2013-08-28 秀治 小川 Authentication system
JP5262802B2 (en) * 2009-02-17 2013-08-14 株式会社リコー Information processing apparatus, information processing method, and program
US9398043B1 (en) 2009-03-24 2016-07-19 Juniper Networks, Inc. Applying fine-grain policy action to encapsulated network attacks
US8904519B2 (en) * 2009-06-18 2014-12-02 Verisign, Inc. Shared registration system multi-factor authentication
KR101690025B1 (en) * 2009-11-09 2016-12-27 삼성전자주식회사 Apparatus and method for paring for ad-hoc connection in wireless communication terminal
CN102104484A (en) * 2009-12-22 2011-06-22 鸿富锦精密工业(深圳)有限公司 Electronic equipment and password protection method
CA2689853C (en) * 2010-01-29 2011-05-17 Norman F. Goertzen Secure access by a user to a resource
US8832807B1 (en) * 2010-08-05 2014-09-09 Christine E. Kuo Method and apparatus for asynchronous dynamic password
EP2448305A1 (en) * 2010-10-29 2012-05-02 France Telecom Data processing for securing local resources in a mobile device
JP5480122B2 (en) * 2010-12-20 2014-04-23 株式会社シー・エス・イー Content presentation type authentication system
JP5143258B2 (en) * 2011-06-17 2013-02-13 株式会社東芝 Information processing apparatus, information processing method, and control program
US9659164B2 (en) * 2011-08-02 2017-05-23 Qualcomm Incorporated Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
US8689294B1 (en) * 2011-11-11 2014-04-01 Symantec Corporation Systems and methods for managing offline authentication
KR20130085492A (en) * 2011-12-09 2013-07-30 한국전자통신연구원 Authentication system and method by use of non-fixed user id
US8631475B1 (en) * 2011-12-21 2014-01-14 Emc Corporation Ordering inputs for order dependent processing
US8650627B2 (en) * 2011-12-28 2014-02-11 Tata Consultancy Services Ltd. Computer implemented system and method for providing challenge-response solutions to authenticate a user
US20130182576A1 (en) * 2012-01-13 2013-07-18 Qualcomm Incorporated Context-aware mobile computing for automatic environment detection and re-establishment
US9367678B2 (en) 2012-02-29 2016-06-14 Red Hat, Inc. Password authentication
US9648490B2 (en) 2012-03-01 2017-05-09 Qualcomm Incorporated Context-aware mobile computing for automatic environment detection and re-establishment
US9058479B2 (en) 2012-04-17 2015-06-16 International Business Machines Corporation Pass-pattern authentication for computer-based security
SG194267A1 (en) * 2012-05-03 2013-11-29 C3S Pte Ltd Method and system for protecting a password during an authentication process
US20140195908A1 (en) * 2013-01-07 2014-07-10 Frank Brunswig Uniform value help and value check
US20140304789A1 (en) * 2013-04-05 2014-10-09 International Business Machines Corporation Convenient one-time password
US9043605B1 (en) * 2013-09-19 2015-05-26 Emc Corporation Online and offline validation of tokencodes
US9536067B1 (en) * 2014-01-01 2017-01-03 Bryant Christopher Lee Password submission without additional user input
US10178088B2 (en) * 2015-03-12 2019-01-08 Tejas Networks Ltd. System and method for managing offline and online password based authentication
US9569606B2 (en) 2015-06-08 2017-02-14 International Business Machines Corporation Verification of a pattern based passcode
US9736169B2 (en) 2015-07-02 2017-08-15 International Business Machines Corporation Managing user authentication in association with application access
US9602284B1 (en) * 2015-09-11 2017-03-21 Bank Of America Corporation Secure offline authentication
WO2017071369A1 (en) * 2015-10-31 2017-05-04 华为技术有限公司 Method and device for predicting user unsubscription
US10075416B2 (en) 2015-12-30 2018-09-11 Juniper Networks, Inc. Network session data sharing
US10558790B2 (en) * 2017-05-31 2020-02-11 International Business Machines Corporation Multi-level matrix passwords

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4423287A (en) * 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US5655077A (en) * 1994-12-13 1997-08-05 Microsoft Corporation Method and system for authenticating access to heterogeneous computing services
AU4091199A (en) * 1998-05-21 1999-12-06 Equifax, Inc. System and method for authentication of network users
US6324646B1 (en) 1998-09-11 2001-11-27 International Business Machines Corporation Method and system for securing confidential data in a computer network
US6898711B1 (en) 1999-01-13 2005-05-24 International Business Machines Corporation User authentication system and method for multiple process applications
US6418472B1 (en) 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
US20020013904A1 (en) * 2000-06-19 2002-01-31 Gardner Richard Mervyn Remote authentication for secure system access and payment systems
JP2002091919A (en) 2000-09-13 2002-03-29 Sec:Kk Authentication system
US6732282B1 (en) * 2000-10-20 2004-05-04 Sony Corporation System and method of determining the power relationship among devices
JP4275080B2 (en) 2002-02-13 2009-06-10 パスロジ株式会社 User authentication method and user authentication system
CN101815074B (en) 2002-02-13 2012-07-04 帕斯罗基株式会社 User authentication method and user authentication system
EP1538531A1 (en) 2002-09-12 2005-06-08 Mitsubishi Denki Kabushiki Kaisha Authentication system, authentication device, terminal device, and authentication method
JP4316311B2 (en) 2003-07-03 2009-08-19 株式会社日立製作所 Authentication method using logical password, information processing apparatus, program, and recording medium
US20050182946A1 (en) 2004-02-13 2005-08-18 Will Shatford Fast hashing function for pseudo-random generator
JP4550513B2 (en) 2004-07-28 2010-09-22 三菱電機株式会社 Password generation device, password generation method, password generation system, IC card, authentication device, authentication method, and authentication system
US8738536B2 (en) * 2005-04-14 2014-05-27 Microsoft Corporation Licensing content for use on portable device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009213139A (en) * 2008-03-05 2009-09-17 Samsung Electronics Co Ltd Password system
US8209746B2 (en) 2010-02-15 2012-06-26 Computer Systems Engineering Co., Ltd. Content presentation-type authentication system
WO2011099161A1 (en) * 2010-02-15 2011-08-18 株式会社 シー・エス・イー Content presentation-type authentication system
JP4654329B1 (en) * 2010-02-15 2011-03-16 株式会社シー・エス・イー Content presentation type authentication system
JP4713693B1 (en) * 2010-10-05 2011-06-29 株式会社シー・エス・イー Offline two-factor user authentication system, method and program
WO2012046303A1 (en) 2010-10-05 2012-04-12 株式会社シー・エス・イー Offline two- factor user authentication system, method thereforthereof, and program thereforthereof
US8752147B2 (en) 2010-10-05 2014-06-10 Cse Co., Ltd System and method for two-factor user authentication
US20130185778A1 (en) * 2010-10-05 2013-07-18 Shigetomo Tamai System, method and program for off-line two-factor user authentication
CN102804201A (en) * 2010-10-05 2012-11-28 株式会社希爱思异 Offline two-factor user authentication system, method thereforthereof, and program thereforthereof
US8875264B2 (en) 2010-10-05 2014-10-28 Cse Co., Ltd. System, method and program for off-line two-factor user authentication
JP2014511047A (en) * 2011-02-07 2014-05-01 ボール,デイヴィッド Smart card with verification means
JP2012079284A (en) * 2011-02-21 2012-04-19 Cse:Kk Offline two-factor user authentication system, method therefor, and program therefor
JP2014512589A (en) * 2011-03-03 2014-05-22 マイクロソフト コーポレーション Sharing user IDs between operating systems and applications
WO2013185326A1 (en) * 2012-06-14 2013-12-19 Google Inc. Verifying user identity

Also Published As

Publication number Publication date
US7984491B2 (en) 2011-07-19
US7945948B2 (en) 2011-05-17
US20070234063A1 (en) 2007-10-04
US20100043063A1 (en) 2010-02-18
JP3996939B2 (en) 2007-10-24

Similar Documents

Publication Publication Date Title
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
KR101878149B1 (en) Device, system, and method of secure entry and handling of passwords
US9465786B2 (en) Method for facilitating quick logins from a mobile device
JP6256116B2 (en) Communication terminal, secure login method, and program
US8799668B2 (en) Rubbing encryption algorithm and security attack safe OTP token
Petsas et al. Two-factor authentication: is the world ready? Quantifying 2FA adoption
CN101601222B (en) Online data encryption and decryption
US7941834B2 (en) Secure web-based user authentication
US6327659B2 (en) Generalized user identification and authentication system
CN101345617B (en) Safety authentication system and method
RU2369025C2 (en) Interacting module facilities for collection of authenticators and access
CN104604204B (en) Server certificate mistake is safely manipulated in synchronous communication
US8140855B2 (en) Security-enhanced log in
US9094212B2 (en) Multi-server authentication token data exchange
US8918849B2 (en) Secure user credential control
US8191126B2 (en) Methods and devices for pattern-based user authentication
TWI526037B (en) Method and system for abstrcted and randomized one-time use passwords for transactional authentication
US8255696B2 (en) One-time password access to password-protected accounts
AU2006307996B2 (en) Method and system for secure password/PIN input via mouse scroll wheel
Jansen Authenticating mobile device users through image selection
JP2013532433A (en) Method and apparatus for secure entry of personal data
JP3956130B2 (en) Authentication device, authentication system, authentication method, program, and recording medium
KR20110119521A (en) System for safely inputting password using shift value of password input and method thereof
JP2013527708A (en) Flexible quasi-out-of-band authentication structure
JP2015509632A (en) Login method, login device, terminal, and network server

Legal Events

Date Code Title Description
TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20070723

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20070803

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100810

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100810

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100810

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110810

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110810

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120810

Year of fee payment: 5

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130810

Year of fee payment: 6

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130810

Year of fee payment: 6

R360 Written notification for declining of transfer of rights

Free format text: JAPANESE INTERMEDIATE CODE: R360

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130810

Year of fee payment: 6

R370 Written measure of declining of transfer procedure

Free format text: JAPANESE INTERMEDIATE CODE: R370

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

R360 Written notification for declining of transfer of rights

Free format text: JAPANESE INTERMEDIATE CODE: R360

R370 Written measure of declining of transfer procedure

Free format text: JAPANESE INTERMEDIATE CODE: R370

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250